Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (315)
- TÜBİTAK (202)
- University of Nebraska - Lincoln (96)
- Technological University Dublin (36)
- Santa Clara University (34)
-
- Old Dominion University (30)
- Wright State University (29)
- California State University, San Bernardino (26)
- Singapore Management University (26)
- Kennesaw State University (20)
- University of Arkansas, Fayetteville (20)
- University of Central Florida (20)
- Western University (20)
- University of Louisville (19)
- University of South Carolina (19)
- Chulalongkorn University (18)
- Air Force Institute of Technology (17)
- Embry-Riddle Aeronautical University (17)
- University of Tennessee, Knoxville (17)
- California Polytechnic State University, San Luis Obispo (15)
- West Virginia University (15)
- Portland State University (14)
- Universitas Indonesia (14)
- Association of Arab Universities (12)
- City University of New York (CUNY) (12)
- University of South Florida (12)
- The University of Akron (11)
- Chapman University (10)
- University of Kentucky (10)
- University of Massachusetts Amherst (10)
- Keyword
-
- Deep learning (57)
- Machine learning (53)
- Computer Science (34)
- Deep Learning (30)
- Machine Learning (24)
-
- Artificial Intelligence (22)
- Cybersecurity (21)
- Robotics (21)
- Artificial intelligence (20)
- Department of Computer Science (20)
- Simulation (19)
- Classification (16)
- Blockchain (15)
- COVID-19 (15)
- Computer vision (13)
- Security (13)
- AI (11)
- Computer Engineering (11)
- Convolutional neural network (11)
- IoT (11)
- Genetic algorithm (10)
- Reinforcement learning (10)
- Automation (9)
- Bibliometric Analysis (9)
- Cloud computing (9)
- Computer Vision (9)
- Department of Computer Science and Engineering (9)
- Internet of Things (9)
- Natural language processing (9)
- Clustering (8)
- Publication
-
- Journal of System Simulation (315)
- Turkish Journal of Electrical Engineering and Computer Sciences (202)
- Library Philosophy and Practice (e-journal) (55)
- Browse all Theses and Dissertations (29)
- Theses and Dissertations (29)
-
- Electronic Theses and Dissertations (28)
- Dissertations (26)
- Publications (25)
- Research Collection School Of Computing and Information Systems (25)
- Journal of International Technology and Information Management (23)
- Computer Science and Engineering Senior Theses (22)
- Department of Electrical and Computer Engineering: Faculty Publications (20)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (18)
- Doctoral Dissertations (15)
- Graduate Theses, Dissertations, and Problem Reports (14)
- Makara Journal of Technology (14)
- Masters Theses (13)
- Symposium of Student Scholars (13)
- Master's Theses (12)
- Electronic Theses and Dissertations, 2020- (11)
- Future Computing and Informatics Journal (11)
- USF Tampa Graduate Theses and Dissertations (11)
- Williams Honors College, Honors Research Projects (11)
- Articles (10)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (10)
- Graduate Theses and Dissertations (10)
- Honors Theses (10)
- Electrical and Computer Engineering Faculty Research and Publications (9)
- Electronic Thesis and Dissertation Repository (9)
- Engineering Faculty Articles and Research (9)
- Publication Type
- File Type
Articles 1 - 30 of 1385
Full-Text Articles in Engineering
Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee
Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee
Dissertations
People nowadays use the Internet to project their assessments, impressions, ideas, and observations about various subjects or products on numerous social networking sites. These sites serve as a great source of gathering information for data analytics, sentiment analysis, natural language processing, etc. The most critical challenge is interpreting this data and capturing the sentiment behind these expressions. Sentiment analysis is analyzing, processing, concluding, and inferencing subjective texts with the views. Companies use sentiment analysis to understand public opinions, perform market research, analyze brand reputation, recognize customer experiences, and study social media influence. According to the different needs for aspect granularity, …
Machine Learning Techniques For Network Analysis, Irfan Lateef
Machine Learning Techniques For Network Analysis, Irfan Lateef
Dissertations
The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.
A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …
On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu
Dissertations
Due to the rapid transition from traditional experiment-based approaches to large-scale, computational intensive simulations, next-generation scientific applications typically involve complex numerical modeling and extreme-scale simulations. Such model-based simulations oftentimes generate colossal amounts of data, which must be transferred over high-performance network (HPN) infrastructures to remote sites and analyzed against experimental or observation data on high-performance computing (HPC) facility. Optimizing the performance of both data transfer in HPN and simulation-based model development on HPC is critical to enabling and accelerating knowledge discovery and scientific innovation. However, such processes generally involve an enormous set of attributes including domain-specific model parameters, network transport …
A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko
A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko
Dissertations
To repair an incorrect program does not mean to make it correct; it only means to make it more-correct, in some sense, than it is. In the absence of a concept of relative correctness, i.e. the property of a program to be more-correct than another with respect to a specification, the discipline of program repair has resorted to various approximations of absolute (traditional) correctness, with varying degrees of success. This shortcoming is concealed by the fact that most program repair tools are tested on basic cases, whence making them absolutely correct is not clearly distinguishable from making them relatively more-correct. …
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
Articles
This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …
Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh
Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh
Elinvo (Electronics, Informatics, and Vocational Education)
The application of health protocols is a regulation that is applied to prevent the spread of Covid-19. Public awareness of the implementation of health protocols is still lacking. This study aims to determine the performance of the detection system using the Blimp Drone as an effort to mitigate the spread of Covid-19 based on the Internet of Things. The method used in system development consists of literature review, needs analysis, design, manufacture, and testing. This system uses the Blimp Drone as a vehicle to carry out flight missions. Raspberry pi camera as a component for distance detection in …
Lapindo Embankment Security Monitoring System Based On Iot, Shazana Dhiya Ayuni, Syamsudduha Syahrorini, Jamaaluddin Jamaaluddin
Lapindo Embankment Security Monitoring System Based On Iot, Shazana Dhiya Ayuni, Syamsudduha Syahrorini, Jamaaluddin Jamaaluddin
Elinvo (Electronics, Informatics, and Vocational Education)
Since 2006 Lapindo mudflow caused by natural gas drilling in Sidoarjo. Nowdays the mudflow still can't be stopped, and to prevent it from resident's houses, embankments were built. Eventough the embankments and guardrails has been built but sometimes the mud flowing into resident's houses while its raining or the embankments were subsidence or reep. Severity, the distance between the embankment and the residents' houses is about 500 m. So far, the handling action while embankments ware subsidence is residents report the accidents to related parties, namely PPLS. But the response is too late and take a long time to occur …
Power Monitoring And Passenger Classification On Logistics Elevator, Isa Hafidz, Aldhitiansyah Putra, Billy Montolalu, Dimas Adiputra, Rifky Dwi Putranto, Rafly Daffaldi, Dinda Karisma Ulfa
Power Monitoring And Passenger Classification On Logistics Elevator, Isa Hafidz, Aldhitiansyah Putra, Billy Montolalu, Dimas Adiputra, Rifky Dwi Putranto, Rafly Daffaldi, Dinda Karisma Ulfa
Elinvo (Electronics, Informatics, and Vocational Education)
The elevator has an important role in assisting transportation and logistics activities in a building. However, if the elevator is not used wisely, then the power consumption will be inefficient. A policy of elevator usage is necessary to ensure the effectiveness of elevator power consumption. Therefore, in this study, elevator power consumption monitoring is proposed. The power consumption behavior can be learned so a suitable policy can be made accordingly. Two elevators in Telkom Campus Surabaya are monitored to understand the daily electrical energy usage. Internet of Things (IoT) based real-time power monitoring system is used to monitor the electrical …
The Automatic Monitoring System For Wpp, Spp, And Pln Based On The Internet Of Things (Iot) Using Sonoff Pow R2, Yosi Apriani, Muhammad Rama Bagaskara, Ian Mochamad Sofian, Wiwin A. Oktaviani, Muhammad Hurairoh
The Automatic Monitoring System For Wpp, Spp, And Pln Based On The Internet Of Things (Iot) Using Sonoff Pow R2, Yosi Apriani, Muhammad Rama Bagaskara, Ian Mochamad Sofian, Wiwin A. Oktaviani, Muhammad Hurairoh
Elinvo (Electronics, Informatics, and Vocational Education)
The usefulness of monitoring systems in the electric power system supports the importance of people's work today. One of which is the monitoring system at the generator. The monitoring system for Wind Power Plant (WPP), Solar Power Plant (SPP), and electricity from State Electricity Company (PLN) use IoT (Internet of Things) in the form of Sonoff Pow R2. With the monitoring system on this tool, the parameter values for WPP, SPP, and PLN can be seen and monitored online via a smartphone. The purpose of this research is to design a monitoring system for WPP, SPP, and PLN based on …
Algorithm Hardware Codesign For High Performance Neuromorphic Computing, Haowen Fang
Algorithm Hardware Codesign For High Performance Neuromorphic Computing, Haowen Fang
Dissertations - ALL
Driven by the massive application of Internet of Things (IoT), embedded system and Cyber Physical System (CPS) etc., there is an increasing demand to apply machine intelligence on these power limited scenarios. Though deep learning has achieved impressive performance on various realistic and practical tasks such as anomaly detection, pattern recognition, machine vision etc., the ever-increasing computational complexity and model size of Deep Neural Networks (DNN) make it challenging to deploy them onto aforementioned scenarios where computation, memory and energy resource are all limited. Early studies show that biological systems' energy efficiency can be orders of magnitude higher than that …
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Posters-at-the-Capitol
Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …
Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay
Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay
Posters-at-the-Capitol
The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …
Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam
Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam
Faculty & Staff Scholarship
Heavy-duty trucks contribute approximately 20% of fuel consumption in the United States of America (USA). The fuel economy of heavy-duty vehicles (HDV) is affected by several real-world parameters like road parameters, driver behavior, weather conditions, and vehicle parameters, etc. Although modern vehicles comply with emissions regulations, potential malfunction of the engine, regular wear and tear, or other factors could affect vehicle performance. Predicting fuel consumption per trip based on dynamic on-road data can help the automotive industry to reduce the cost and time for on-road testing. Data modeling can easily help to diagnose the reason behind fuel consumption with a …
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Computer Science and Engineering Theses and Dissertations
The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …
Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang
Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang
Doctoral Dissertations and Master's Theses
Robotic odor source localization (OSL) is a technology that enables mobile robots or autonomous vehicles to find an odor source in unknown environments. It has been viewed as challenging due to the turbulent nature of airflows and the resulting odor plume characteristics. The key to correctly finding an odor source is designing an effective olfactory-based navigation algorithm, which guides the robot to detect emitted odor plumes as cues in finding the source. This dissertation proposes three kinds of olfactory-based navigation methods to improve search efficiency while maintaining a low computational cost, incorporating different machine learning and artificial intelligence methods.
A. …
Graph Based Management Of Temporal Data, Alex Fotso
Graph Based Management Of Temporal Data, Alex Fotso
Master of Science in Computer Science Theses
In recent decades, there has been a significant increase in the use of smart devices and sensors that led to high-volume temporal data generation. Temporal modeling and querying of this huge data have been essential for effective querying and retrieval. However, custom temporal models have the problem of generalizability, whereas the extended temporal models require users to adapt to new querying languages. In this thesis, we propose a method to improve the modeling and retrieval of temporal data using an existing graph database system (i.e., Neo4j) without extending with additional operators. Our work focuses on temporal data represented as intervals …
Development Of A Model For Control Of A Flexible Production Sewage System, Shalala Jafarova
Development Of A Model For Control Of A Flexible Production Sewage System, Shalala Jafarova
Scientific-technical journal
This article discusses the development of a production module management model for one area of the technological process. New modeling methods are used for this purpose. Mathematical modeling and research is one of the key issues in the early stages of designing automated and automated systems operating in uncertain or fuzzy environments. Efficient modeling devices are used to solve these problems, taking into account the specific features of the process. The article builds the management model of the production module and obtains the results.
Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo
Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo
Department of Information Systems & Computer Science Faculty Publications
This paper presents a novel method for automatic segmentation of dental X-ray images into single tooth sections and for placing every segmented tooth onto a precise corresponding position table. Moreover, the proposed method automatically determines the tooth’s position in a panoramic X-ray film. The image-processing step incorporates a variety of image-enhancement techniques, including sharpening, histogram equalization, and flat-field correction. Moreover, image processing was implemented iteratively to achieve higher pixel value contrast between the teeth and cavity. The next image-enhancement step is aimed at detecting the teeth cavity and involves determining the segment and points separating the upper and lower jaw, …
Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu
Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu
Publications
As the role of online platforms has become increasingly prominent for communication, toxic behaviors, such as cyberbullying and harassment, have been rampant in the last decade. On the other hand, online toxicity is multi-dimensional and sensitive in nature, which makes its detection challenging. As the impact of exposure to online toxicity can lead to serious implications for individuals and communities, reliable models and algorithms are required for detecting and understanding such communications. In this paper We define toxicity to provide a foundation drawing social theories. Then, we provide an approach that identifies multiple dimensions of toxicity and incorporates explicit knowledge …
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi
School of Information Systems and Technology Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi
Walden Faculty and Staff Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
Precision Grasp Planning For Integrated Arm-Hand Systems, Shuwei Qiu
Precision Grasp Planning For Integrated Arm-Hand Systems, Shuwei Qiu
Electronic Thesis and Dissertation Repository
The demographic shift has caused labor shortages across the world, and it seems inevitable to rely on robots more than ever to fill the widening gap in the workforce. The robotic replacement of human workers necessitates the ability of autonomous grasping as the most natural but rather a vital part of almost all activities. Among different types of grasping, fingertip grasping attracts much attention because of its superior performance for dexterous manipulation. This thesis contributes to autonomous fingertip grasping in four areas including hand-eye calibration, grasp quality evaluation, inverse kinematics (IK) solution of robotic arm-hand systems, and simultaneous achievement of …
3d Shape Estimation Of Negative Obstacles Using Lidar Point Cloud Data, Viswadeep Lebakula
3d Shape Estimation Of Negative Obstacles Using Lidar Point Cloud Data, Viswadeep Lebakula
Theses and Dissertations
Obstacle detection and avoidance plays a crucial role in the autonomous navigation of unmanned ground vehicles (UGV). Information about the obstacles decreases as the distance between the UGV and obstacles increases. However, this information decreases much more rapidly for negative obstacles than for positive obstacles. UGV navigation becomes more challenging in off-road environments due to the higher probability of finding negative obstacles (e.g., potholes, ditches, trenches, etc.) compared with on-road environments. One approach to solve this problem is to avoid the candidate path with a negative obstacle, but in off-road environments avoiding negative obstacles in all situations is not possible. …
Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.
Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.
Theses and Dissertations
Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.
This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …
The Application Of Design Thinking On Evaluating A User Self-Service Data Analytics/Science Platform, Aheeka Pattnaik
The Application Of Design Thinking On Evaluating A User Self-Service Data Analytics/Science Platform, Aheeka Pattnaik
Dissertations and Theses
This thesis is aimed at utilising design thinking and the first half of the double diamond framework to i) set-up a research and select the appropriate participants, ii) gather requirements and define user personas from those eligible participants, and then iii) define the framework for evaluating a user self-service data analytics/science platform. Derived from the author’s own experiences, both as a Business Analyst (BA) and Citizen Data Scientist, with no-, low-, and code-based data analytics and science platforms are being implemented for enabling user self-service analytics – for users who are completely new to the space of data analysis and …
Design Of Plastic Contaminant Eliminator In Seed Cotton, Joshua H. Tandio
Design Of Plastic Contaminant Eliminator In Seed Cotton, Joshua H. Tandio
Theses and Dissertations
Plastic contamination in cotton is a problem in cotton industry and researchers have worked on this problem with different approaches. This thesis documents the design of mechanical and electronic real-time systems for detecting and removing plastic contaminants. The mechanical system was designed to expose plastic embedded inside the seed cotton to the sensor and to separate plastic contaminated cotton from the process stream. The detection system consisted of an embedded computer interfaced with a USB camera and Neural Network (NN) software running in it. Two NN models were tested, a transfer learning model and a built-from-scratch original model. The original …
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Honors College Theses
Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …
Iot Greenhouse Monitoring System, Raj Basnet
Iot Greenhouse Monitoring System, Raj Basnet
Honors Theses
Our project is a greenhouse monitoring system. The customer states that they need a complete monitoring system for their greenhouse. There are a lot of items within the greenhouse that need to be watered at the right time and kept at a certain temperature. The customer is not always around to check the status of these items due to their busy lifestyle. They would like a system to monitor all these items so they can check it on their smartphone no matter how far away they are from the greenhouse. The customer wants this to be a low-cost and energyefficient …
3d Bionic Arm, Anny Baez Silfa
3d Bionic Arm, Anny Baez Silfa
Publications and Research
Previous work had been done on what was an adaptation of a robotic arm for Roboqueen, which is a persistent research project of the Department of Computer Engineering Technology. This robotic arm consisted of removing the cardboard hands from the Roboqueen and being replaced by 3D printed fingers and wrists to add functionality that did not exist before. Servo motors connected to Arduinos hidden in the forearm will be used to move the fingers and pick up and hold objects in the hand. Currently, the Finger Myoware is an update of the robotic arm in order to understand how prosthetic …
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Publications and Research
The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.
Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …