Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

Computer Engineering

2022

Institution
Keyword
Publication

Articles 1 - 30 of 259

Full-Text Articles in Engineering

Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li Dec 2022

Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li

Discovery Undergraduate Interdisciplinary Research Internship

Through research and interviews, I discovered that a significant portion of students in Africa become drug addicts and drop out of school. The solution is to prevent youth substance abuse before it happens, so that more students in Africa may continue their education. With the strong motivation of expanding African student involvement in higher education, I participated DURI program to increase higher education rates in the Democratic Republic of the Congo, Africa. The local government is establishing rehabilitation centers to monitor at-risk students and prevent youth substance abuse, but due to extremely limited resources, it is critical to evaluate the …


Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price Dec 2022

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price

Student Works

The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …


Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson Dec 2022

Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson

Chemical Engineering and Materials Science Faculty Research Publications

Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …


Enhanced Neurologic Concept Recognition Using A Named Entity Recognition Model Based On Transformers, Sima Azizi, Daniel B. Hier, Donald C. Wunsch Dec 2022

Enhanced Neurologic Concept Recognition Using A Named Entity Recognition Model Based On Transformers, Sima Azizi, Daniel B. Hier, Donald C. Wunsch

Chemistry Faculty Research & Creative Works

Although Deep Learning Has Been Applied to the Recognition of Diseases and Drugs in Electronic Health Records and the Biomedical Literature, Relatively Little Study Has Been Devoted to the Utility of Deep Learning for the Recognition of Signs and Symptoms. the Recognition of Signs and Symptoms is Critical to the Success of Deep Phenotyping and Precision Medicine. We Have Developed a Named Entity Recognition Model that Uses Deep Learning to Identify Text Spans Containing Neurological Signs and Symptoms and Then Maps These Text Spans to the Clinical Concepts of a Neuro-Ontology. We Compared a Model based on Convolutional Neural Networks …


An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan Dec 2022

An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Python, currently one of the most popular programming languages, is an object-
oriented language that also provides language feature support for other programming
paradigms, such as functional and procedural. It is not currently understood how
support for multiple paradigms affects the ability of developers to comprehend that
code. Understanding the predominant paradigm in code, and how developers classify
the predominant paradigm, can benefit future research in program comprehension as
the paradigm may factor into how people comprehend that code. Other researchers
may want to look at how the paradigms in the code interact with various code smells.
To investigate how …


A Robust Platform For Mobile Robotics Teaching And Developing Using Arduino’S Integrated Development Environment (Ide) For Programming The Arduino Mega 2560, Sajjad Alhassan Dec 2022

A Robust Platform For Mobile Robotics Teaching And Developing Using Arduino’S Integrated Development Environment (Ide) For Programming The Arduino Mega 2560, Sajjad Alhassan

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

In light of the rapid pace at which development happens with modern technology, mobile robots play an important role in our daily lives. This is due to their great importance in facilitating the affairs of life in various economic, commercial, industrial, scientific, and many other fields. In this research and project, we have restructured the microcontroller and system for one of the mobile robots (CEENBOT) that was designed by the University of Nebraska and replaced it with an Arduino Mega 2560.

The purpose of using the Arduino Mega 2560 robot is to provide alternative programming for the CEENBOT platform to …


An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu Dec 2022

An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu

Engineering Technology Faculty Publications

Nowadays, EVs are rapidly increasing in popularity, and are accepted as the vehicles of the future all over the world. The most important components are their battery and charging systems. The energy capacity of EVs’ batteries has a significant potential to supply different energy requirements. Therefore, EVs must be designed in accordance with bidirectional power flow, and Electric Vehicle Supply Equipment (EVSE) should be upgraded as Electric Vehicle Power Exchange Equipment (EVPE). This power exchange infrastructure can be called Vehicle-to-Anything (V2X). V2X will also be the key solution for energy grids of the future that will turn into a much …


Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang Dec 2022

Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang

Electrical and Computer Engineering Faculty Publications

Nowadays short texts can be widely found in various social data in relation to the 5G-enabled Internet of Things (IoT). Short text classification is a challenging task due to its sparsity and the lack of context. Previous studies mainly tackle these problems by enhancing the semantic information or the statistical information individually. However, the improvement achieved by a single type of information is limited, while fusing various information may help to improve the classification accuracy more effectively. To fuse various information for short text classification, this article proposes a feature fusion method that integrates the statistical feature and the comprehensive …


Mitigating Popularity Bias In Recommendation With Unbalanced Interactions: A Gradient Perspective, Weijieying Ren, Lei Wang, Kunpeng Liu, Ruocheng Guo, Ee-Peng Lim, Yanjie Fu Dec 2022

Mitigating Popularity Bias In Recommendation With Unbalanced Interactions: A Gradient Perspective, Weijieying Ren, Lei Wang, Kunpeng Liu, Ruocheng Guo, Ee-Peng Lim, Yanjie Fu

Research Collection School Of Computing and Information Systems

Recommender systems learn from historical user-item interactions to identify preferred items for target users. These observed interactions are usually unbalanced following a long-tailed distribution. Such long-tailed data lead to popularity bias to recommend popular but not personalized items to users. We present a gradient perspective to understand two negative impacts of popularity bias in recommendation model optimization: (i) the gradient direction of popular item embeddings is closer to that of positive interactions, and (ii) the magnitude of positive gradient for popular items are much greater than that of unpopular items. To address these issues, we propose a simple yet efficient …


Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan Dec 2022

Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Deep neural networks (DNNs) can perform impressively in many natural language processing (NLP) tasks, but their black-box nature makes them inherently challenging to explain or interpret. Self-Explanatory models are a new approach to overcoming this challenge, generating explanations in human-readable languages besides task objectives like answering questions. The main focus of this thesis is the explainability of NLP tasks, as well as how attention methods can help enhance performance. Three different attention modules are proposed, SimpleAttention, CrossSelfAttention, and CrossModality. It also includes a new dataset transformation method called Two-Documents that converts every dataset into two separate documents required by the …


Low Power Multi-Channel Interface For Charge Based Tactile Sensors, Samuel Hansen Dec 2022

Low Power Multi-Channel Interface For Charge Based Tactile Sensors, Samuel Hansen

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Analog front end electronics are designed in 65 nm CMOS technology to process charge pulses arriving from a tactile sensor array. This is accomplished through the use of charge sensitive amplifiers and discrete time filters with tunable clock signals located in each of the analog front ends. Sensors were emulated using Gaussian pulses during simulation. The digital side of the system uses SAR (successive approximation register) ADCs for sampling of the processed sensor signals.

Adviser: Sina Balkır


A Stacking-Based Misbehavior Detection System In Vehicular Communication Networks, Troy Green Dec 2022

A Stacking-Based Misbehavior Detection System In Vehicular Communication Networks, Troy Green

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Over the past few decades communication systems for vehicles have continued to advance. Communications between these vehicles can be classified into safety related and non safety related messages. An example of a safety related message would be one vehicle warning others of an icy road it encountered, where a non safety related communication would be a passenger streaming a movie. In either case it's important to secure the communications so that the system continues to behave as expected. In this thesis we propose a Misbehavior Detection System (MDS), which is a system that monitors messages sent between vehicles, and detects …


A Low-Power, Low-Area 10-Bit Sar Adc With Length-Based Capacitive Dac, Zhili Pan Dec 2022

A Low-Power, Low-Area 10-Bit Sar Adc With Length-Based Capacitive Dac, Zhili Pan

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

A 2.5 V single-ended 10-bit successive-approximation-register analog-to-digital converter (SAR ADC) based on the TSMC 65 nm CMOS process is designed with the goal of achieving low power consumption (33.63 pJ/sample) and small area (2874 µm^2 ). It utilizes a novel length-based capacitive digital-to-analog converter (CDAC) layout to achieve low total capacitance for power efficiency, and a custom static asynchronous logic to free the dependence on a high-frequency external clock source. Two test chips have been designed and the problems found through testing the first chip are analyzed. Multiple improved versions of the ADC with minor variations are implemented on the …


Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal Dec 2022

Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Formal concept analysis(FCA) is a mathematical theory based on lattice and order theory used for data analysis and knowledge representation. Over the past several years, many of its extensions have been proposed and applied in several domains including data mining, machine learning, knowledge management, semantic web, software development, chemistry ,biology, medicine, data analytics, biology and ontology engineering.

This thesis reviews the state-of-the-art of theory of Formal Concept Analysis(FCA) and its various extensions that have been developed and well-studied in the past several years. We discuss their historical roots, reproduce the original definitions and derivations with illustrative examples. Further, we provide …


Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven Dec 2022

Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Fact verification has become an important process, primarily done manually by humans, to verify the authenticity of claims and statements made online. Increasingly, social media companies have utilized human effort to debunk false claims on their platforms, opting to either tag the content as misleading or false, or removing it entirely to combat misinformation on their sites. In tandem, the field of automatic fact verification has become a subject of focus among the natural language processing (NLP) community, spawning new datasets and research. The most popular dataset is the Fact Extraction and VERification (FEVER) dataset. In this thesis an end-to-end …


Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li Dec 2022

Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Viral metagenomics is independent of lab culturing and capable of investigating viromes of virtually any given environmental niches. While numerous sequences of viral genomes have been assembled from metagenomic studies over the past years, the natural hosts for the majority of these viral contigs have not been determined. Different computational approaches have been developed to predict hosts of bacteria phages. Nevertheless, little progress has been made in the virus-host prediction, especially for viruses that infect eukaryotes and archaea. In this study, by analyzing all documented viruses with known eukaryotic and archaeal hosts, we assessed the predictive power of four computational …


Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu Dec 2022

Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu

Computer Science Faculty Publications and Presentations

Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.


A Pipeline To Generate Deep Learning Surrogates Of Genome-Scale Metabolic Models, Achilles Rasquinha Nov 2022

A Pipeline To Generate Deep Learning Surrogates Of Genome-Scale Metabolic Models, Achilles Rasquinha

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Genome-Scale Metabolic Models (GEMMs) are powerful reconstructions of biological systems that help metabolic engineers understand and predict growth conditions subjected to various environmental factors around the cellular metabolism of an organism in observation, purely in silico. Applications of metabolic engineering range from perturbation analysis and drug-target discovery to predicting growth rates of biotechnologically important metabolites and reaction objectives within dierent single-cell and multi-cellular organism types. GEMMs use mathematical frameworks for quantitative estimations of flux distributions within metabolic networks. The reasons behind why an organism activates, stuns, or fluctuates between alternative pathways for growth and survival, however, remain relatively unknown. GEMMs …


Computer Engineering Education, Marilyn Wolf Nov 2022

Computer Engineering Education, Marilyn Wolf

CSE Conference and Workshop Papers

Computer engineering is a rapidly evolving discipline. How should we teach it to our students?

This virtual roundtable on computer engineering education was conducted in summer 2022 over a combination of email and virtual meetings. The panel considered what topics are of importance to the computer engineering curriculum, what distinguishes computer engineering from related disciplines, and how computer engineering concepts should be taught.


Tau Kinetics In Alzheimer's Disease, Daniel B. Hier, Sima Azizi, Matthew S. Thimgan, Donald C. Wunsch Nov 2022

Tau Kinetics In Alzheimer's Disease, Daniel B. Hier, Sima Azizi, Matthew S. Thimgan, Donald C. Wunsch

Chemistry Faculty Research & Creative Works

The Cytoskeletal Protein Tau is Implicated in the Pathogenesis of Alzheimer's Disease Which is Characterized by Intra-Neuronal Neurofibrillary Tangles Containing Abnormally Phosphorylated Insoluble Tau. Levels of Soluble Tau Are Elevated in the Brain, the CSF, and the Plasma of Patients with Alzheimer's Disease. to Better Understand the Causes of These Elevated Levels of Tau, We Propose a Three-Compartment Kinetic Model (Brain, CSF, and Plasma). the Model Assumes that the Synthesis of Tau Follows Zero-Order Kinetics (Uncorrelated with Compartmental Tau Levels) and that the Release, Absorption, and Clearance of Tau is Governed by First-Order Kinetics (Linearly Related to Compartmental Tau Levels). …


Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr. Nov 2022

Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.

Technical Collection

The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …


Quality Evaluation Of Agricultural And Food Products By Using Image Processing And Soft Computing Paradigm, Narendra Vg Nov 2022

Quality Evaluation Of Agricultural And Food Products By Using Image Processing And Soft Computing Paradigm, Narendra Vg

Technical Collection

My research interests revolve around the problem of quality evaluation of Agricultural and Food Products by using Image Processing and Soft Computing Paradigm. Much of my recent work focuses on develop a framework for quality evaluation of Edible Nuts using Computer Vision and Soft Computing Techniques. Also, my interest in developing a framework for defects recognition and classification of Fruits and Vegetables using deep learning methods. My research has also explored many problems related to Blockchain Technology while considering the supply chain management of Agricultural and Food products in between with formers, retailers, and consumers.

  1. http://doi.org/10.1109/DELCON54057.2022.9752836
  2. http://doi.org/10.1007/978-3-031-07012-9_56
  3. http://doi.org/10.1007/978-981-15-8603-3_30
  4. http://doi.org/10.1007/978-981-15-8603-3_29
  5. http://doi.org/10.1007/978-981-15-8603-3_29


Energy Efficient Routing Technique In Underwater Wireless Sensor Networks, Yashwanth N Dr. Nov 2022

Energy Efficient Routing Technique In Underwater Wireless Sensor Networks, Yashwanth N Dr.

Technical Collection

Wireless sensor networks can improve the efficiency for collecting information in underwater environments. In the past, researchers collected data under the sea by the way of both sending oceanographic equipments into water and recovering it at the end of mission. The whole process often took long time so real-time services cannot be supported. Wireless sensor networks can detect events and transmit the collected data to a data center immediately. However, current terrestrial routing protocols are not suitable in the underwater sensor networks. Due to unique characteristics in the water, the transmission performance and energy of the routing protocols are inefficient. …


Classification Of Mudra And Posture Images Of Bharatanatyam, Venkatesh Bhandage Dr. Nov 2022

Classification Of Mudra And Posture Images Of Bharatanatyam, Venkatesh Bhandage Dr.

Technical Collection

Bharatanatyam is an Indian classical dance form which has to be studies under the supervision of experts/gurus. In this modern era there is scarcity of Bharatanatyam teachers and also the youth is less fascinated towards the classical dance forms. To promote and propagate this Indian classical dance form it is required to take leverage of technology. Hence, the automatic classification of Mudras and Postures was attempted as part of the research work. The research work can be used in training the novice learners, to provide online commentary during the concerts and e-learning of Bharatanatyam dance. The research work can help …


Daylight-Artificial Light Integrated System With The Camera As The Sensor And Wireless Sensor Actuator Networked (Wsan) System, Susan G. Varghese Dr. Nov 2022

Daylight-Artificial Light Integrated System With The Camera As The Sensor And Wireless Sensor Actuator Networked (Wsan) System, Susan G. Varghese Dr.

Technical Collection

Image based wireless sensor actuator network-based daylight artificial light control scheme is developed. Now the work is progressing by incorporating Internet of Things. The work is under lighting control technology and applications.

Present work is based on IoT based lighting and venetian blind automation for smart building:-

  • Design low power wireless sensor network for an IoT based smart lighting
  • Model-based control strategy implementation for optimized visual comfort, thermal comfort, energy efficiency and Circadian Entrainment suitable for operating with IoT sensors and actuators.
  • Sensor Integration and algorithm formulation for remote monitoring and control of building parameters for smart lighting

Research focuses …


Geohash-Based Rapid Query Method Of Regional Transactions In Blockchain For Internet Of Vehicles, Chang Zhou, Huimei Lu, Yong Xiang, Jingbang Wu, Feng Wang Nov 2022

Geohash-Based Rapid Query Method Of Regional Transactions In Blockchain For Internet Of Vehicles, Chang Zhou, Huimei Lu, Yong Xiang, Jingbang Wu, Feng Wang

Faculty and Student Publications

Many researchers have introduced blockchain into the Internet of Vehicles (IoV) to support trading or other authentication applications between vehicles. However, the traditional blockchain cannot well support the query of transactions that occur in a specified area which is important for vehicle users since they are bound to the geolocations. Therefore, the querying efficiency of the geolocation attribute of transactions is vital for blockchain-based applications. Existing work does not well handle the geolocation of vehicles in the blockchain, and thus the querying efficiency is questionable. In this paper, we design a rapid query method of regional transactions in blockchain for …


Fastklee: Faster Symbolic Execution Via Reducing Redundant Bound Checking Of Type-Safe Pointers, Haoxin Tu, Lingxiao Jiang, Xuhua Ding, He Jiang Nov 2022

Fastklee: Faster Symbolic Execution Via Reducing Redundant Bound Checking Of Type-Safe Pointers, Haoxin Tu, Lingxiao Jiang, Xuhua Ding, He Jiang

Research Collection School Of Computing and Information Systems

Symbolic execution (SE) has been widely adopted for automatic program analysis and software testing. Many SE engines (e.g., KLEE or Angr) need to interpret certain Intermediate Representations (IR) of code during execution, which may be slow and costly. Although a plurality of studies proposed to accelerate SE, few of them consider optimizing the internal interpretation operations. In this paper, we propose FastKLEE, a faster SE engine that aims to speed up execution via reducing redundant bound checking of type-safe pointers during IR code interpretation. Specifically, in FastKLEE, a type inference system is first leveraged to classify pointer types (i.e., safe …


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


A Smart Parallel Gripper Industrial Automation System For Measurement Of Gripped Work Piece Thickness, Erik Kocher, Chukwuemeka George Ochieze, Ahmat Oumar, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh Nov 2022

A Smart Parallel Gripper Industrial Automation System For Measurement Of Gripped Work Piece Thickness, Erik Kocher, Chukwuemeka George Ochieze, Ahmat Oumar, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh

Michigan Tech Publications

As part of the advanced programmable logic controllers (PLC) course at Michigan Tech, this class project is performed on a mechatronics system gifted by Donald Engineering, a Michigan-based supplier of industrial automation systems and components. This paper explores the functionality and ladder programming of the smart parallel gripper system to measure the width of components grasped with the gripper. In addition, details of the system’s components, operation, more advanced uses are discussed. On the automation line, this smart gripper can be used to measure the thickness of work pieces while handling them and classifying these as either acceptable, too large …


Gesture Controlled Collaborative Robot Arm And Lab Kit, Abel A. Reyes, Skylar Reinhardt, Tony Wise, Nathir Rawashdeh, Sidike Paheding Nov 2022

Gesture Controlled Collaborative Robot Arm And Lab Kit, Abel A. Reyes, Skylar Reinhardt, Tony Wise, Nathir Rawashdeh, Sidike Paheding

Michigan Tech Publications

In this paper, a mechatronics system was designed and implemented to include the subjects of artificial intelligence, control algorithms, robot servo motor control, and human-machine interface (HMI). The goal was to create an inexpensive, multi-functional robotics lab kit to promote students’ interest in STEM fields including computing and mechtronics. Industrial robotic systems have become vastly popular in manufacturing and other industries, and the demand for individuals with related skills is rapidly increasing. Robots can complete jobs that are dangerous, dull, or dirty for humans to perform. Recently, more and more collaborative robotic systems have been developed and implemented in the …