Essays about: "integrated automation"
Showing result 1 - 5 of 105 essays containing the words integrated automation.
-
1. Design of a case erecting and product placement station
University essay from Lunds universitet/InnovationAbstract : This report presents an innovative approach to industrial automation, focusing on the development of an automated system for erecting and filling cardboard boxes with wax jars. The project, executed in collaboration with Odigo Consulting and Scandinavian Hair Company (SHC), aimed to showcase enhanced production efficiency for small and medium-sized enterprises through the implementation of collaborative robots and pneumatic systems. READ MORE
-
2. Lateral Control of Heavy Vehicles
University essay from KTH/Väg- och spårfordon samt konceptuell fordonsdesignAbstract : The automotive industry has been involved in making vehicles autonomous to different levels in the past decade rapidly. Particularly in the commercial vehicle market, there is a significant necessity to make trucks have a certain level of automation to help reduce dependence on human efforts to drive. READ MORE
-
3. Solutions for presence detection in an intercom door station
University essay from Lunds universitet/Industriell elektroteknik och automationAbstract : In this work, different solutions for human presence detection in a door intercom device are examined. The study was conducted at a company in Lund, Sweden. READ MORE
-
4. Java Auto Grader
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The process of grading code submissions in programming courses is time-consuming and error-prone. To address this issue, we propose a project that automates the testing and grading process for Java code submissions at Halmstad University. READ MORE
-
5. Automated Vulnerability Management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The field of software security is constantly evolving, and security must be taken into consideration throughout the entire product life cycle. This is particularly important in today’s dynamic security landscape, where threats and vulnerabilities constantly change. READ MORE