Jung Yun Bae (ME-EM) was quoted by Michigan Ag Connection and Kalamazoo’s WWMT News Channel 3 in more stories about Michigan Tech engineering students’ partnership with Lucky Clover Farm in Otsego County to create a robot to harvest lavender plants.
The Michigan Tech College of Computing offers a full range of undergraduate and graduate degrees in the Computing disciplines.
Timothy Havens (CS/GLRC/ICC) is the principal investigator on a project that has received a $200,000 research applied grant from the U.S. Department of the Interior, U.S. Fish and Wildlife Service. The project is titled “Capacitating machine vision research at FWS Green Bay Fish and Wildlife Conservation Office.” Phillipe Wernette (GLRC/ICC) and Evan Lucas (CC/GLRC/ICC) are . . .
Michigan Tech is offering both a in-person and online certificate in the Foundations of Cybersecurity. In nine credits, students will learn how to identify and describe the foundational principles of securing both a computer system and a computer network. They’ll also study the fundamentals of secure software development and apply them effectively. This credential addresses cyber crime, a costly . . .
All Michigan Tech alumni and friends are invited to join us on campus August 1–3, 2024, for Reunion 2024. Check out the full schedule of events. The College of Computing invites alumni to two College events at Reunion 2024. Details below. College of Computing Alumni Reunion Gathering Thursday, August 1, 7:30-9:30 pm, at the Rozsa Center Join us . . .
PhD candidate Sadia Nowrin, Computer Science, will present her PhD Final Oral Examination (defense) on Monday, July 29, 2024, from 3-5 pm EDT via Zoom online meeting. The title of Norwin’s defense is, “Programming by Voice.” Join the Zoom meeting.
The Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles (SmartSP 2024) invites researchers and developers from academia, industry, and government to submit papers. The conference takes place November 7-8, 2024, in New Orleans, LA. The conference focuses on theoretical analysis, vulnerability discovery, novel system architecture construction and design, emerging . . .