Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

City University of New York (CUNY)

Discipline
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 65

Full-Text Articles in Computer Engineering

The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown Jun 2023

The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown

Publications and Research

In this study, the offline programming tool RoboDK is used to program industrial robots for the automation sector. The study explores the feasibility of using this non-disruptive robot programming software for classroom use; assesses how well RoboDK can be used to program various robots used in the industry; creates and tests various applications; and pinpoints technical obstacles that prevent a smooth link between offline programming and actual robots. Initial results indicate that RoboDK is an effective tool for deploying its offline programming code to a Universal Robot, UR3e. There are many potential for advanced applications. The goal of the project …


Development Of A Raspberry Pi-Controlled Vex Robot For A Robotics Technology Course, Lili Ma, Justin Bartholomew, Yu Wang, Xiaohai Li Jun 2023

Development Of A Raspberry Pi-Controlled Vex Robot For A Robotics Technology Course, Lili Ma, Justin Bartholomew, Yu Wang, Xiaohai Li

Publications and Research

This paper describes the development of a Raspberry PI-controlled VEX robot for an undergraduate robotic course. The Raspberry PI controls the mobile base built using the VEX robotics kit without using the Cortex micro-controller that comes with the kit. The aim is to create a physical robot that is manageable, easily replicable, and capable of performing advanced robotic control tasks such as vision-based control.

The constructed robot adopts the great features of the PI and the VEX hardware. Firstly, the VEX hardware consists of various sensors and actuators for students to practice the construction and assembly of an autonomous robot. …


Introducing Ros-Projects To Undergraduate Robotic Curriculum, Lili Ma, Yu Wang, Chen Xu, Xiaohai Li Jun 2023

Introducing Ros-Projects To Undergraduate Robotic Curriculum, Lili Ma, Yu Wang, Chen Xu, Xiaohai Li

Publications and Research

This paper describes three MATLAB-ROS-based simulation projects developed for an undergraduate robotics course. The Robot Operating System (ROS) is an open-source framework that helps researchers and developers build and reuse code between robotics applications. Adoption of ROS in the undergraduate curricula is still rare due to its demanding requirements of C++/Python/Java programming skills and familiarity with Linux. Recently, MathWorks released its ROS Toolbox, making it easier to interact with simulators like the Gazebo and ROS-supported physical robots. The MATLAB-ROS-Gazebo simulation platform allows students to utilize other MATLAB Toolboxes, such as Image Processing, Computer Vision, Visualization, and Navigation Toolboxes, for fast …


Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe May 2023

Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe

Publications and Research

Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …


Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu May 2023

Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu

Publications and Research

Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.

This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?

The study examines various cyber-attack types, including malware, phishing, …


Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur Jun 2022

Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur

Publications and Research

What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.

Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …


Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy May 2022

Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy

Publications and Research

The main purpose of this project is to create a functional prototype of a multilayered system that incorporates aspects of electrical, mechanical, and computer engineering technology. The main objective of the system is to be able to determine whether a light bulb is working or not. The building blocks of this system are a robotic arm that is able to slide along a rail (for added mobility), a conveyor belt, and an electromechanical device that holds and tests light bulbs. Initially, the robot arm picks up a light bulb and places it into the holder which then tests it. A …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii Dec 2021

Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii

Publications and Research

The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.

Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …


3d Bionic Arm, Anny Baez Silfa Dec 2021

3d Bionic Arm, Anny Baez Silfa

Publications and Research

Previous work had been done on what was an adaptation of a robotic arm for Roboqueen, which is a persistent research project of the Department of Computer Engineering Technology. This robotic arm consisted of removing the cardboard hands from the Roboqueen and being replaced by 3D printed fingers and wrists to add functionality that did not exist before. Servo motors connected to Arduinos hidden in the forearm will be used to move the fingers and pick up and hold objects in the hand. Currently, the Finger Myoware is an update of the robotic arm in order to understand how prosthetic …


Child Detection System For Preventing Hot-Car Death, Touheda Khanom, Fahmeda Khanom Dec 2021

Child Detection System For Preventing Hot-Car Death, Touheda Khanom, Fahmeda Khanom

Publications and Research

According to the Safety Organization Kids and Cars, an average of 38 children die each year from hot cars due to lack of attention from parents. Existing alert system uses sensors that detect child presence and care less about detecting temperature inside the car. In order to save children from heatstroke, our research focuses on providing information about the temperature inside the car using very effective sensors with high precision. In our research, we have tested different sensors and figured out three sensors that can provide precise information about the presence of a child without an adult. Our child detection …


Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii Nov 2021

Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii

Publications and Research

Ever increasing demands of data traffic makes the transition to 6G communications in the 300 GHz band inevitable. Short-channel field-effect transistors (FETs) have demonstrated excellent potential for detection and generation of terahertz (THz) and sub-THz radiation. Such transistors (often referred to as TeraFETs) include short-channel silicon complementary metal oxide (CMOS). The ballistic and quasi-ballistic electron transport in the TeraFET channels determine the TeraFET response at the sub-THz and THz frequencies. TeraFET arrays could form plasmonic crystals with nanoscale unit cells smaller or comparable to the electron mean free path but with the overall dimensions comparable with the radiation wavelength. Such …


Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac Nov 2021

Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac

Publications and Research

Increasing usage of Digital Manufacturing (DM) in safety-critical domains is increasing attention on the cybersecurity of the manufacturing process, as malicious third parties might aim to introduce defects in digital designs. In general, the DM process involves creating a digital object (as CAD files) before using a slicer program to convert the models into printing instructions (e.g. g-code) suitable for the target printer. As the g-code is an intermediate machine format, malicious edits may be difficult to detect, especially when the golden (original) models are not available to the manufacturer. In this work we aim to quantify this hypothesis through …


Inverse Kinematics Of The 6dof C12xl, Carl Liu, Lili Ma Nov 2021

Inverse Kinematics Of The 6dof C12xl, Carl Liu, Lili Ma

Publications and Research

Industrial robotic manipulators are widely used in applications such as pick & place, welding, and assembly to perform repeated tasks in replace of human labor. Such tasks typically require fully autonomous mechanical arms that are capable of identifying the parts to operate, path planning, and trajectory generation & tracking. A robotic arm consists of a sequence of rigid links connected by movable components (the joints). Proper control of the arm’s motion requires the knowledge of inverse kinematics, which computes/outputs the joint variables, i.e., angles for revolute joints and displacement for prismatic joints, causing the robotic arm’s end effector (e.g., gripper, …


Predicting Vasovagal Responses: A Model-Based And Machine Learning Approach, Theodore Raphan, Sergei B. Yakushi Mar 2021

Predicting Vasovagal Responses: A Model-Based And Machine Learning Approach, Theodore Raphan, Sergei B. Yakushi

Publications and Research

Vasovagal syncope (VVS) or neurogenically induced fainting has resulted in falls, fractures, and death. Methods to deal with VVS are to use implanted pacemakers or beta blockers. These are often ineffective because the underlying changes in the cardiovascular system that lead to the syncope are incompletely understood and diagnosis of frequent occurrences of VVS is still based on history and a tilt test, in which subjects are passively tilted from a supine position to 20◦ from the spatial vertical (to a 70◦ position) on the tilt table and maintained in that orientation for 10–15 min. Recently, is has been shown …


Cooperative Target Tracking In Concentric Formations, Lili Ma Jan 2021

Cooperative Target Tracking In Concentric Formations, Lili Ma

Publications and Research

This paper considers the problem of coordinating multiple unmanned aerial vehicles (UAVs) in a circular formation around a moving target. The main contribution is allowing for versatile formation patterns on the basis of the following components. Firstly, new uniform spacing control laws are proposed that spread the agents not necessarily over a full circle, but over a circular arc. Uniform spacing formation controllers are proposed, regulating either the separation distances or the separation angles between agents. Secondly, the use of virtual agents is proposed to allow for different radii in agents’ orbits. Thirdly, a hierarchical combination of formation patterns is …


Distributed Cross-Community Collaboration For The Cloud-Based Energy Management Service, Yu-Wen Chen, J. Morris Chang Jan 2021

Distributed Cross-Community Collaboration For The Cloud-Based Energy Management Service, Yu-Wen Chen, J. Morris Chang

Publications and Research

Customers’ participation is a critical factor for inte-grating the distributed energy resources via demand response and demand-side management programs, especially when customers become prosumers. Incentives need to be delivered by the energy management service to attract prosumers to operate their distributed energy resources and electricity loads grid-friendly actively. The cloud-based energy management service enables virtual trading for customers within the same community to minimize cost and smooth the fluctuation. With the potential fast-growing number of service providers and customers, the needs exist for efficiently collaborating across multiple service providers and customers. This paper proposes the distributed cross-community collaboration (XCC) for …


Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella Dec 2020

Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella

Publications and Research

Our research project aims to provide a visually impaired person with a superimposed map that will guide the individual to the desired destination through a voice controlled virtual assistant application that integrates Augmented Reality (AR) with Artificial Intelligence (AI) Computer Vision and Natural Language Processing (subfields of AI) will be combined to identify the spatial environment and then create a graphic enhancement that provides the most direct route to the specific destination These technologies will be incorporated into the Microsoft Hololens which will be controlled by the user.


Improve The Prototype Of Low-Cost Near-Infrared Diffuse Optical Imaging System, Chen Xu, Mohammed Z. Shakil Dec 2020

Improve The Prototype Of Low-Cost Near-Infrared Diffuse Optical Imaging System, Chen Xu, Mohammed Z. Shakil

Publications and Research

Diffuse Optical Tomography (DOT) and Optical Spectroscopy using near-infrared (NIR) diffused light has demonstrated great potential for the initial diagnosis of tumors and in the assessment of tumor vasculature response to neoadjuvant chemotherapy. The aims of this project are 1) to test the different types of LEDs in the near-infrared range, and design the driving circuit, and test the modulation of LEDs at different frequencies; 2) to test the APDs as a detector, and build the receiver system and compare efficiency with pre-built systems. In this project, we are focusing on creating a low-cost infrared transmission system for tumor and …


Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon Dec 2020

Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon

Publications and Research

Feature selection of NSL-KDD data set is usually done by finding co-relationships among features, irrespective of target prediction. We aim to determine the relationship between features and target goals to facilitate different target detection goals regardless of the correlated feature selection. The unbalanced data structure in NSL-KDD data can be relaxed by Proportional Representation (PR). However, adopting PR would deny the notion of winner-take-all by attracting a majority of the vote and also provide a fairly proportional share for any grouping of like-minded data. Furthermore, minorities and majorities would get a fair share of power and representation in data structure …


Sharing And Organizing Research Products As R Packages, Matti Vuorre, Matthew J. C. Crump Sep 2020

Sharing And Organizing Research Products As R Packages, Matti Vuorre, Matthew J. C. Crump

Publications and Research

A consensus on the importance of open data and reproducible code is emerging. How should data and code be shared to maximize the key desiderata of reproducibility, permanence, and accessibility? Research assets should be stored persistently in formats that are not software restrictive, and documented so that others can reproduce and extend the required computations. The sharing method should be easy to adopt by already busy researchers. We suggest the R package standard as a solution for creating, curating, and communicating research assets. The R package standard, with extensions discussed herein, provides a format for assets and metadata that satisfies …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Cooperative Target Tracking In Balanced Circular And Elliptical Formations, Lili Ma, Naira Hovakimyan Aug 2020

Cooperative Target Tracking In Balanced Circular And Elliptical Formations, Lili Ma, Naira Hovakimyan

Publications and Research

This paper extends our earlier results on cooperative target tracking in cyclic pursuit using a group of mobile robots by further prescribing the formation radius and achieving an elliptical formation pattern. Prescribing the formation radius of a balanced circular formation is achieved by adjusting a parameter in the existing control input to each robot. The new elliptical formation pattern is obtained via a transformation matrix. Both single-integrator and double-integrator robot models are considered. The effectiveness of the proposed schemes is demonstrated by simulation examples.


Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner Jul 2020

Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner

Publications and Research

Autonomous unmanned aerial vehicles (UAVs) operating as a swarm can be deployed in austere environments, where cyber electromagnetic activities often require speedy and dynamic adjustments to swarm operations. Use of central controllers, UAV synchronization mechanisms or pre-planned set of actions to control a swarm in such deployments would hinder its ability to deliver expected services. We introduce artificial intelligence and game theory based flight control algorithms to be run by each autonomous UAV to determine its actions in near real-time, while relying only on local spatial, temporal and electromagnetic (EM) information. Each UAV using our flight control algorithms positions itself …


Cyber Security Techniques- What Is The Internet?, Amy J. Ramson Apr 2020

Cyber Security Techniques- What Is The Internet?, Amy J. Ramson

Open Educational Resources

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.


Bracelet Reminder For Alzheimer’S, Jennifer Islam, Caroline Rodriguez, Farrukh Zia Apr 2020

Bracelet Reminder For Alzheimer’S, Jennifer Islam, Caroline Rodriguez, Farrukh Zia

Publications and Research

This project involves the design, construction and testing of a personal reminder device for elderly who suffer from Alzheimer’s using a clock system and LED wearable technology. The device consists of an RGB LED strip connected to a 7-segment display (which operates as a clock circuit) attached to a microcontroller board. The device uses visual output to alert the user at that certain time the color being emitted represents the reminder the user set for that time. The project involves two phases. In the first phase, an RGB LED strip will be used to make a wearable device and tested …


Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza Jan 2020

Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza

Publications and Research

This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas, stimulated by the multifaceted technological boom expressed in accelerated globalization, digital transformation, the cloud, mobile access apps, and the Internet of Things (IoT)—where more and more devices are connected to the Internet every day. As the use of new Internet-based technologies increase; so does the risk of theft and misuse of sensitive information. This demands the awareness of cyber-criminality and the need for cyber hygiene in corporations, small businesses, and the government. As the need for experienced cybersecurity specialists has skyrocketed in recent years and …


Hardware Implementation Of Assistive Technology Robot, Joycephine Li Dec 2019

Hardware Implementation Of Assistive Technology Robot, Joycephine Li

Publications and Research

SuperHERO is an on-going research project in Computer Engineering Technology department which involves upgrading Heathkit Education Robot (HERO) hardware circuits and features by using modern hardware devices and sensors. The current phase of the project will focus on upgrading the motor drive system hardware as well as implementation and testing of features such as mobile robot obstacle detection and other assistive technologies to help people with disabilities. This involves the reattachment of the robot arm after repairing and updating with 3D printing and using modern hardware and software technology. We observed that the robotic arm has rotary and translation movements …


International Space Object Orbit Tracker, Nicole Navarro Dec 2019

International Space Object Orbit Tracker, Nicole Navarro

Publications and Research

This software engineering project involves development of machine learning algorithms for embedded applications. High speed 32-bit hardware devices such as Raspberry Pi and ARM microcontrollers has become inexpensive and readily available. Machine learning algorithms for applications such as image processing and image recognition are computationally intensive. But with the availability of low cost 32-bit embedded computing devices, it is now feasible to implement then on embedded hardware. This project will explore embedded applications of machine learning algorithms by following a software engineering design and test approach.