scholarly journals Implementing Personal Devices in Math

2020 ◽  
Vol 22 (3) ◽  
Author(s):  
Jamie W McDaniel
Keyword(s):  
Author(s):  
A.F. Klebanov ◽  
M.V. Kadochnikov ◽  
V.V. Ulitin ◽  
D.N. Sizemov

The article addresses the issues of ensuring safe operation of mining equipment in surface mining. It describes the main factors and situations that pose a high risk to human life and health. The most dangerous incidents are shown to be related to limited visibility and blind spots for operators of mining equipment, which can result in collisions and personnel run over. The main technologies and specific solutions used to design collision avoidance systems are described and their general comparison is provided. A particular focus is placed on monitoring the health of employees at their workplace by means of portable personal devices that promptly inform the dispatcher of emergency situations. General technical requirements are formulated for designing of the system to prevent equipment collisions and personnel run over in surface mining operations. The paper emphasizes the importance of introducing a multifunctional safety system in surface mines in order to minimise the possibility of incidents and accidents throughout the entire production cycle.


Author(s):  
Keith M. Martin

In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 626
Author(s):  
Ramya Gupta ◽  
Abhishek Prasad ◽  
Suresh Babu ◽  
Gitanjali Yadav

A global event such as the COVID-19 crisis presents new, often unexpected responses that are fascinating to investigate from both scientific and social standpoints. Despite several documented similarities, the coronavirus pandemic is clearly distinct from the 1918 flu pandemic in terms of our exponentially increased, almost instantaneous ability to access/share information, offering an unprecedented opportunity to visualise rippling effects of global events across space and time. Personal devices provide “big data” on people’s movement, the environment and economic trends, while access to the unprecedented flurry in scientific publications and media posts provides a measure of the response of the educated world to the crisis. Most bibliometric (co-authorship, co-citation, or bibliographic coupling) analyses ignore the time dimension, but COVID-19 has made it possible to perform a detailed temporal investigation into the pandemic. Here, we report a comprehensive network analysis based on more than 20,000 published documents on viral epidemics, authored by over 75,000 individuals from 140 nations in the past one year of the crisis. Unlike the 1918 flu pandemic, access to published data over the past two decades enabled a comparison of publishing trends between the ongoing COVID-19 pandemic and those of the 2003 SARS epidemic to study changes in thematic foci and societal pressures dictating research over the course of a crisis.


2014 ◽  
Vol 3 (6) ◽  
Author(s):  
Geoff Rebbeck

This Case study shows and explains the issues and value of placing a whole Greenwich first degree completed in Jan. 2007 into an e-portfolio. The purpose is to show proof of concept that it is possible and how it looks in basic form, when done retrospectively (6 years later).The completed portfolio was the presentation made at the APT Conference July 2013, audience members also able to access and explore it on personal devices in the session.The Case Study considers whether a degree can be presented inside a portfolio, what the issues are in creating a degree portfolio like this, what limitations may be encountered in the process.It then evaluates the value of this approach, and what might be done with a Greenwich University degree in this form.


2011 ◽  
Vol 2 (3) ◽  
pp. 22-37 ◽  
Author(s):  
Roel Peeters ◽  
Dave Singelée ◽  
Bart Preneel

Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of or fewer compromised user’s devices, with being an adjustable threshold number. It removes the single point of failure in the system, as access is granted when one carries any set of user’s devices. Additionally it supports user-centered management, since users can alter the set of personal devices and can adjust the security parameters of the access control scheme towards their required level of security and reliability.


2021 ◽  
Vol 14 (3) ◽  
pp. 1-26
Author(s):  
Danielle Bragg ◽  
Katharina Reinecke ◽  
Richard E. Ladner

As conversational agents and digital assistants become increasingly pervasive, understanding their synthetic speech becomes increasingly important. Simultaneously, speech synthesis is becoming more sophisticated and manipulable, providing the opportunity to optimize speech rate to save users time. However, little is known about people’s abilities to understand fast speech. In this work, we provide an extension of the first large-scale study on human listening rates, enlarging the prior study run with 453 participants to 1,409 participants and adding new analyses on this larger group. Run on LabintheWild, it used volunteer participants, was screen reader accessible, and measured listening rate by accuracy at answering questions spoken by a screen reader at various rates. Our results show that people who are visually impaired, who often rely on audio cues and access text aurally, generally have higher listening rates than sighted people. The findings also suggest a need to expand the range of rates available on personal devices. These results demonstrate the potential for users to learn to listen to faster rates, expanding the possibilities for human-conversational agent interaction.


Sign in / Sign up

Export Citation Format

Share Document