scholarly journals A Review on Efficient Identification of Posture Alterations Through the Analysis of the Footprint and Artificial Vision Technologies

2021 ◽  
Vol 20 ◽  
pp. 15-24
Author(s):  
Taha Ahmadi ◽  
Hernández Cristian ◽  
Cubillos Neil

This article presents a review of the most relevant manual techniques and technologies developed from the field of artificial vision aimed at identifying biomechanical alterations. The purpose is to describe the most important aspects of each technology, focused on the description of each of its stages and experimental results, which suggest the integration of mobile devices with artificial vision techniques, in addition to the different computer programs used for such end. Finally, the results showed that the identification of the crook index for alterations in posture turns out to be a technique currently used by most specialists. The great challenge is to develop portable devices through mobile applications that allow the detection of the corvo index and the barometric analysis, as well as for other types of applications that depend on visual analysis by experts.

2021 ◽  
Vol 5 (3) ◽  
pp. 32
Author(s):  
Benedikt Mutsch ◽  
Peter Walzel ◽  
Christian J. Kähler

The droplet deformation in dispersing units of high-pressure homogenizers (HPH) is examined experimentally and numerically. Due to the small size of common homogenizer nozzles, the visual analysis of the transient droplet generation is usually not possible. Therefore, a scaled setup was used. The droplet deformation was determined quantitatively by using a shadow imaging technique. It is shown that the influence of transient stresses on the droplets caused by laminar extensional flow upstream the orifice is highly relevant for the droplet breakup behind the nozzle. Classical approaches based on an equilibrium assumption on the other side are not adequate to explain the observed droplet distributions. Based on the experimental results, a relationship from the literature with numerical simulations adopting different models are used to determine the transient droplet deformation during transition through orifices. It is shown that numerical and experimental results are in fairly good agreement at limited settings. It can be concluded that a scaled apparatus is well suited to estimate the transient droplet formation up to the outlet of the orifice.


2018 ◽  
Vol 30 (3) ◽  
pp. 438-444
Author(s):  
Jomah Alzoubi ◽  
Shadi A Alboon ◽  
Amin Alqudah

In the last decade, the applications of nano- and micro-technology are widely used in many fields. In the modern mobile devices, such as digital cameras, there is an increased demand to achieve fast and precise positioning for some parts such as the recording sensor. Therefore, a smart material (piezoelectric) is used to achieve this requirement. This article discusses the feed-forward control for a piezoelectric actuator using differential flatness approach. The differential flatness approach is used to calculate the required voltage to control the piezoelectric actuator movement. The control voltage will be applied to the real actuator. The simulation and experimental results are compared for the actuator. The aim of this article is to verify the feed-forward control for second eigenfrequency using the differential flatness approach for the piezoelectric actuator.


2011 ◽  
Vol 1 (1) ◽  
pp. 41-53 ◽  
Author(s):  
Fudong Li ◽  
Nathan Clarke ◽  
Maria Papadaki ◽  
Paul Dowland

Mobile devices have become essential to modern society; however, as their popularity has grown, so has the requirement to ensure devices remain secure. This paper proposes a behaviour-based profiling technique using a mobile user’s application usage to detect abnormal activities. Through operating transparently to the user, the approach offers significant advantages over traditional point-of-entry authentication and can provide continuous protection. The experiment employed the MIT Reality dataset and a total of 45,529 log entries. Four experiments were devised based on an application-level dataset containing the general application; two application-specific datasets combined with telephony and text message data; and a combined dataset that included both application-level and application-specific. Based on the experiments, a user’s profile was built using either static or dynamic profiles and the best experimental results for the application-level applications, telephone, text message, and multi-instance applications were an EER (Equal Error Rate) of 13.5%, 5.4%, 2.2%, and 10%, respectively.


2018 ◽  
Vol 8 (3) ◽  
pp. 124-128
Author(s):  
Nadide Duygu Solak ◽  
Murat Topaloglu

The number of mobile applications has been increasing rapidly in every field of life with the increasing use of smart devices. Smartphones and tablets make our lives easier with their properties and application they include. Minor or major accidents in traffic are always present in the daily life resulting in financial damage and loss of lives. There have been a number of studies done to speed up the processes to be done from the moment an accident happens. This study aims to enable people to perform all of the post-accident processes quickly and accurately with the use of mobile devices. In this way, papers and documents like photographs will be sent to the competent authorities without wasting time and effort. In addition, access to the road assistance needed will be quite easy. Keywords: Traffic accident, loss assessment and proceedings, mobile application.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Parimah Ziayi ◽  
Seyed Mostafa Farmanbar ◽  
Mohsen Rezvani

In GSM, the network is not authenticated which allows for man-in-the-middle (MITM) attacks. Attackers can track traffic and trace users of cellular networks by creating a rogue base transceiver station (BTS). Such a defect in addition to the need for backward compatibility of mobile networks makes all GSM, UMTS, and LTE networks susceptible to MITMs. These attacks are conducted using IMSI-Catchers (ICs). Most of the solutions proposed for detecting ICs in the literature are based on using specific mobile devices with root access. Also, they cannot identify ICs to which users are not connected. In this paper, we propose an approach called YAICD for detecting ICs in the GSM network. YAICD consists of a sensor that can be installed on Android mobile devices. It detects ICs by extracting 15 parameters from signals received from BTSs. We also established a lab-scale testbed to evaluate YAICD for various detection parameters and for comparing it against existing solutions in the literature. The experimental results show that YAICD not only successfully detects ICs using the parameters but also identifies ICs to which users are not yet connected to the network.


Author(s):  
Ewa Janczukowicz ◽  
Ahmed Bouabdallah ◽  
Arnaud Braud ◽  
Stéphane Tuffin ◽  
Jean-Marie Bonnin

Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and furthermore, it wants to redefine the way payments work for mobile applications. Firefox OS is not directly competing with Android and iOS, although it has some common target markets with Android. It could be an opportunity to weaken the iOS and Android duopoly. For now it targets users that don't have smartphones yet and is mostly used on low-end devices. The biggest challenge of Firefox OS is to assure a stable position in the mobile OS ecosystem and to get a large volume of users. Mozilla has an ambition to improve the web and make the web the platform. However developing the Firefox OS and ensuring its important place on the market is difficult because of technological and business limits that will be discussed in this chapter.


Author(s):  
Donovan Peter Chan Wai Loon ◽  
Sameer Kumar

From adults to children, beginners to experts, and in numerous countries around the world, there is a diverse user base for mobile devices. However, the extensive use of mobile devices has also led to the proliferation and attacks of various mobile malware. The purpose of this chapter is to provide an overview of mobile malware. Subsequently, the chapter highlights the current trends and challenges posed by malicious mobile applications. The authors look into Android and iOS mobile platforms and discuss current research to detect malicious applications. Remedies for poor risk communications on Android-based devices are also suggested.


Author(s):  
Nuno André Osório Liberato ◽  
João Eduardo Quintela Alves de Sous Varajão ◽  
Emanuel Soares Peres Correia ◽  
Maximino Esteves Correia Bessa

Location-based mobile services (LBMS) are at present an ever growing trend, as found in the latest and most popular mobile applications launched. They are, indeed, supported by the hasty evolution of mobile devices capabilities, namely smart phones, which are becoming truer mobile pocket-computers; by users demand, always searching for new ways to benefit from technology, besides getting more contextualized and user-centred services; and, lastly, by market drive, which sees mobile devices as a dedicated way to reach customers, providing profile-based publicity, products, discounts and events. With e-commerce, products and services started arriving to potential customers through desktop computers, where they can be bought and fast delivered to a given address. However, expressions such as “being mobile”, “always connected”, “anytime anywhere” that already characterize life in the present will certainly continue to do so in the near future. Meanwhile, mobile devices centred commerce services seem to be the next step. Therefore, this paper presents a system architecture designed for location-based e-commerce systems. These systems, where location plays the most important role, enable a remote products/services search, based in user parameters: after a product search, shops with that products are returned in the search results and are displayed in a map, around the user present location; and services like obtaining more information, reserving and purchasing are made available as well. This concept represents a mix between traditional client-oriented commerce and faceless mass-oriented e-commerce, enabling a proximity-based user-contextualized system, being well capable of conveying significant advantages and facilities to both service-providers/retailers and users.


Sign in / Sign up

Export Citation Format

Share Document