UB ScholarWorks

Browsing Engineering Posters by Title

Browsing Engineering Posters by Title

Sort by: Order: Results:

  • Fazulullah, Abul Hasan (2018-03-23)
    In this data driven decade, it is in high need for a highly available, secure and scalable resource, no matter who provides it. In that case, we tried our best to come up with a better solution that could be a great asset ...
  • Muralidhar, Ajay Menon; Khan, Muhammad Bahauddin; Prashanth, Nitish Makam; Nomula, Neha; Pathak, Prachi (2017-03-24)
    This work is used to bridge the gap between consumer and oil supplier by building a smart monitoring system with the help of  ESP8266 (Wi-Fi module) and  Alexa (Intelligent AI based Virtual Assistant). In the existing ...
  • Khatri, Suman (2017-03-24)
    The study aims at knowing what is Erythroblastosis Fetalis, how it is caused and what are different methods of treatments. During exposure to Rh+ blood cells, Rh-ve mother becomes sensitized and there will be synthesis ...
  • Babu, Vinithra; Elleithy, Khaled M. (2016-04-01)
    Cloud computing is the technique which is mainly used to create a cloud space. These cloud spaces that are created by the user, can store files and also can upload and download information. So in this paper we will be ...
  • Patel, Karan Kakanur; Rakkappan, Maheshwari Kumar; Alhafni, Bashar; Carroll, Phil; Hauge, Josh; Zhang, Xuan; Sajeevan, Rochen Krishna Thashanath; Karkory, Abd Elfatah; Shah, Parth; Kumar, Arjun; Pallis, Jani M.; Lewis, Neal; Reed, Larry; Mestre, David; Pallis, James (2017-03-24)
    On September 1, 2016, a high altitude student platform (HASP) was launched from NASA’s Columbia Scientific Balloon Facility in Fort Sumner, New Mexico with 12 student payloads. The University of Bridgeport sent a robotic ...
  • Elmannai, Wafa; Elleithy, Khaled M. (2012)
  • Gerety, Eugene P.; Elleithy, Khaled M. (2014-03-28)
    Wireless near-field (NFC) and short-range RFID “security” devices are ubiquitous, commonly found in vehicle security (keyless-entry, remote-start), access control (employee key cards), travel cards, point-of-sale (PoS) ...
  • Elmannai, Wafa; Elleithy, Khaled M. (2017-03-24)
  • Alshinina, Remah; Elleithy, Khaled M. (2018-03-23)
    Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, security problems associated with them have not been completely resolved. Middleware is generally introduced as an intermediate ...
  • Al Oudat, Mohammad; Faezipour, Miad (2015-03-27)
    Most individuals do not realize they have a broken vein in the eye until somebody lets them know or they look in a mirror. This condition is not tormenting, but commonly creates obtuse trauma to the eye. Treatment is often ...
  • Dhillon, Gaganpal Kaur; Dhillon, Harinder Pal Kaur (2016-04-01)
    NoSql database is designed to support an ever increasing number of users and data and at the same time it maintains the performance efficiently. We worked with Couchbase distributed NoSql document oriented database that ...
  • Alattas, Reem (2016-04-01)
    This paper proposes a novel framework for automatically designing feasible robots that are made up of various heterogeneous modules and raw materials already existing in the surrounding environment. Moreover, it highlights ...
  • Daneshzand, Mohammad; Faezipour, Miad; Barkana, Buket D. (2015-03-27)
    To investigate how different types of neurons in brain can produce well known spiking patterns, a new computationally efficient model is proposed in this poster. The model can demonstrate various neuronal behavior observed ...
  • Alkhader, Arar; Hu, Junling; Akinkunmi, Akinwumi; Patra, Prabir; Xiong, Xingguo (2014-03-28)
    In this paper a new model for a burns biobandage is introduced not only as a protective means but also as a treatment technique by helping the tissue to rebuild itself as fast as possible. The main objective of this research ...
  • Guedes Almeida Silva, Ítalo; Custódio Cejas, Rafael; Patel, Sarosh; Sobh, Tarek M. (ASEE, 2016-04-28)
    Objectives: Build a mobile robot with an attached handler, with the capabilities of search the near area for objects, collect them, and put them in a specific place. Methods: In order to achieve the proposed goal, the ...
  • Guedes Almeida Silva, Ítalo; Custódio Cejas, Rafael (2016-04-01)
    This work presents the project of a mobile robot with an attached handler, programmed to collect small objects in the near area. The robot takes photos – is able to process a constant stream of images – of the surround ...
  • Zhao, Zihe; Mahmood, Ausif; Patra, Prabir; Rho, Jinnque; Macwan, Isaac (2015-03-27)
    Microorganism cell counting is a basic laboratory technique which was frequently used in Microbiology Lab, hospital and pharmaceutical company. The traditional technique which is called “Hemocytometer method” counts the ...
  • Faezipour, Miad; Aloudat, Mohammad (2016-04-01)
    Glaucoma is the most common cause of blindness in the world, and it is known as the silent thief of vision because it can sneak up on any patient. However, the loss of vision from Glaucoma is preventable. Glaucoma is caused ...
  • Jagtiani, Lalit John; Lewis, Neal (2015-03-27)
    Many factors can influence the ongoing management and execution of technology projects within the corporate business environment. Some of these elements are known a priori during the project planning phase. Others may ...

Search ScholarWorks


Advanced Search

Browse

My Account