prototype implementation
Recently Published Documents


TOTAL DOCUMENTS

403
(FIVE YEARS 86)

H-INDEX

21
(FIVE YEARS 4)

2022 ◽  
pp. 272-290
Author(s):  
Soumen Santra ◽  
Arpan Deyasi

Text-to-Braille conversion as well as speech-to-Braille conversion are not available in combined form so far for the visually impaired, and there is tremendous need of a device that can look after this special class of people. The present chapter deals with a novel model that is designed to help both types of impaired people, be it visual problem or related with hearing. The proposal is itself unique and is also supported by experimental results available within the laboratory condition. This device will help people to read from text with their Braille language and will also help to convert the same form to audio signal. Since text and audio are the two main interfaces for any person to communicate with the external world apart from functionalities of sensory organs, the work has relevance. With the help of DANET, the same data, in text or speech form, can be accessed in more than one digital device simultaneously.


2021 ◽  
Author(s):  
Kazuki Aiura ◽  
Takumasa Ishioka ◽  
Ryota Shiinay ◽  
Tatsuya Fukuiy ◽  
Tomohiro Taniguchiy ◽  
...  

2021 ◽  
Author(s):  
◽  
Neil Ramsay

<p>The development of computerised information systems for large scale emergency management is lacking. These systems could present information and support information transfer across shifts. This is important as providing timely information is critical for efficient search and rescue operations in an emergency environment. This thesis contributes the design and prototype implementation for an interactive visualisation, called RescueTime, which is then evaluated. The evaluation showed that RescueTime is as effective as a traditional tool used by emergency managers. This demonstrates the feasibility of designing and developing larger information systems, for the purpose of emergency management.</p>


2021 ◽  
Author(s):  
◽  
Neil Ramsay

<p>The development of computerised information systems for large scale emergency management is lacking. These systems could present information and support information transfer across shifts. This is important as providing timely information is critical for efficient search and rescue operations in an emergency environment. This thesis contributes the design and prototype implementation for an interactive visualisation, called RescueTime, which is then evaluated. The evaluation showed that RescueTime is as effective as a traditional tool used by emergency managers. This demonstrates the feasibility of designing and developing larger information systems, for the purpose of emergency management.</p>


2021 ◽  
Vol 2042 (1) ◽  
pp. 012042
Author(s):  
Olivier Steiger ◽  
Reto Marek

Abstract Monitoring systems are essential for the energy-efficient and comfortable operation of buildings. However, today's monitoring solutions are relatively expensive in terms of purchase, installation, and maintenance. At the same time, there is a need for low-cost monitoring systems, especially for smaller buildings. To address this need, a novel do-it-yourself, low-cost building monitoring system based on open technologies has been developed. The system is intended to be assembled and put into operation by laymen in accordance with given instructions. Accordingly, all work stages must be simple and obvious. This paper describes the low-cost monitoring system and its prototype implementation.


Author(s):  
Lionel Morel ◽  
Damien Courousse ◽  
Thomas Hiscock

Cyber-attacks combine several techniques to compromise device's functionality, recover sensitive data or unveil IP design. Combined counter-measures are needed to address these complex attacks as a whole. We address attacks that rely on reverse engineering to recover application code and side-channel attacks to access sensitive data. We present POLEN, a toolchain and a processor architecture that combines two countermeasures: code encryption and code polymorphism to thwart such complex attacks. Code encryption reduces the useful information in memory dumps, preventing reverse engineering, by encrypting machine instructions before its deployment, and instructions are only decrypted inside the CPU. Code polymorphism regularly changes the observable behaviour of the program, making it unpredictable for an attacker, and reducing the possibility to exploit side-channel leakages. Using many configuration parameters, POLEN gives the developer the ability to adapt the security level to its application. We present our prototype implementation, based on the RISC-V Spike simulator and a modified LLVM toolchain. We demonstrate that POLEN reduces side-channel leakages through leakage assessments metrics. We show that POLEN achieves a good level of security against side-channel attacks while maintaining acceptable overheads on program performance.


2021 ◽  
Vol 11 (18) ◽  
pp. 8767
Author(s):  
Yazeed Alabdulkarim ◽  
Abdulmajeed Alameer ◽  
Mohammed Almukaynizi ◽  
Abdulaziz Almaslukh

The COVID-19 pandemic has caused many countries around the globe to put strict policies and measures in place in an attempt to control the rapid spread of the virus. These measures have affected economic activities and have impacted a broad range of businesses, such as international traveling, restaurants, and shopping malls. As COVID-19 vaccination efforts progress, countries are starting to relax international travel constraints and permit passengers from certain destinations to cross the border. Moreover, travelers from those destinations are likely required to provide certificates of vaccination results or negative COVID-19 tests before crossing the borders. Implementing these travel guidelines requires sharing information between countries, such as the number of COVID-19 cases and vaccination certificates for travelers. In this paper, we introduce SPIN, a framework leveraging a permissioned blockchain for sharing COVID-19 information between countries. This includes public data, such as the number of vaccinated people, and private data, such as vaccination certificates for individuals. Additionally, we employ cancelable fingerprint templates to authenticate private information about travelers. We analyze the framework from scalability, efficiency, security, and privacy perspectives. To validate our framework, we provide a prototype implementation using the Hyperledger Fabric platform.


2021 ◽  
Author(s):  
giovanni bartolomeo

We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a developer familiar web token exchange flow plus a HTTP basic authentication flow. As such, it may map to Cloud computing SaaS paradigm, enabling microservices integration into a single, authorization-centric digital ecosystem, even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.


Author(s):  
Ali Adib Syed Hifazat Ali

Abstract: This project describes the concept, design and prototype implementation of a pipe climbing-robot. Pipe climbing robots became a stimulating area for research within the last years. Several robots are developed to unravel this given problem. Every construction has its own advantages and disadvantages. The goal of this work was to style another pole climbing robot that uses a replacement clamping principle. Pipe climbing robot has many applications in industrial field as we all know in industry , there are many chemicals that are harmful to human health and therefore the pipelines of which are needed to be inspected frequently. Human can't be allowed to try to to such operations, hence this robot are often very useful in such tasks of inspection. Boilers even have the similar conditions, as temperature and pressure inside the boilers is extremely high, hence to see the pipelines this robot are often used at such places. Keywords: Pipe climbing robot, DC motor, Wireless Control


Sign in / Sign up

Export Citation Format

Share Document