Nt1310 Unit 8 Final Project

Improved Essays
The design idea we had was modified several times. Initially the fingers that were constructed for the hand seemed to work and look fine in our Solidworks assembly. We did not want the fingers to be too large as the girl were were designing the hand for is only seven years old. However, after printing them, we quickly realized that they were far too small to be able to exert the force to grasp a water bottle. Furthermore, because they were so small, it was difficult for the 3D printer to print out the finger because the walls were so thin. This also meant that it was extremely difficult to get support material out, especially without damaging the finger. We resigned the fingers to be longer, and a bit thicker. We made sure to add thickness …show more content…
Again, on the Solidworks assembly the thumb seemed to work fine. However, after printing and assembling it on the hand, we realized that the thumb wrapped around the bottle in a way that made it barely have contact with the bottle. The angle of the bend was too small. It seemed as though it would not be able to have a good grip on the bottle for it to be able to support picking the bottle up. We redesigned the thumb so that it would have a larger angle, however, after printing this out, we realized that when pulling down on the fishing line, the thumb would not bend down like we wanted it to. In our final design, we extended the thumb length and increased the angle slightly so that it would be able to both bend down, and increase the amount of contact it had on the …show more content…
Although the shield functions fine, there is a comfort issue. The shield we initially designed was one long piece, however, the 3D printers we had were not large enough to print such a large piece. Thus, we accommodated to that by printing splitting the shield in half. However, in order for one to be able to be attached to the other, we had to make the latter piece larger so that the side with the motor housing could fit within in and be screwed together. In the future, we would need to make the piece shorter. Also, since we had very small mold of only the girl’s hand, it was difficult to estimate the length, width and curvature the arm shield needed to

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Overview and Objectives Cutting Edge is a sole proprietorship that is owned and operated by Lisa Turner. The company provides services and products for hair in its everyday operations. The owner would like to transition her company to use QuickBooks accounting software to record the daily transactions of the business. The client’s needs are an ongoing list of the clientele with current contact information, to record services and products sold, keep track of inventory and supplies on hand, and oversee the expenses of the company. All of these needs can be fulfilled by implementing QuickBooks 2015.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 6 Project

    • 496 Words
    • 2 Pages

    Our schedule begins in the week of October 10th. This is because we did not complete our site visit until October 6th. After our site visit, we were able to get a better grasp on the project and how long it would take us to complete each step of the project. We set aside two weeks at the beginning of the project to sort and analyze the data that was handed over to us from Lockheed Martin. We also began to concurrently work on the model.…

    • 496 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Isolate Prices Project My program runs as follows first displays the local start time, which would be the current time and would work as almost like the starting point of stopwatch. We than have a vector which is where all the input files information is stored. After, the vector is created we have to fill the vector with the information from the input files. Then we read all the data from the vector and output into 2 files. Lastly the end time is display with the elapsed time.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    A system upgrade is long overdue at NA Videos. This report will outline: 1. Key issues 2. Purpose of the new system (solutions) 3. What the system will and will not include 4.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    The date for my sister’s engagement party was fast approaching. It was two years before her wedding, and she also has acne prone skin. She decided to look up a dermatologist and found one that she thought would suit her needs. After seeing the regimen done on my sister, and how her skin reacted. I had changed my dermatologists to the same one as my sister.…

    • 415 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The third application software is mapping. Mapping application, are those that display street maps or satellite, and are usually used to locate places and directions. The most extensive mapping application is Google maps. When it comes to the location based software it uses your current location, and shows you the closest restaurants, shops, banks, etc. these software's are available for desktops, laptops, and handheld computers.…

    • 223 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Petrissage Research Paper

    • 173 Words
    • 1 Pages

    Petrissage is a form of kneading that is carried out taking hold of the muscle between the thumb and the fingers, the lifting should be of a single muscles. The muscle should be lifted and stretched away from the bone when this has been done the area is kneaded within the hand and this will stimulate tissues, blood vessels, nerves, lymph vessels and glands. This action of compression and relaxation will release the lymph’s out of the spaces that are being worked on into the lymphatics.…

    • 173 Words
    • 1 Pages
    Decent Essays