To see the other types of publications on this topic, follow the link: OpenID Connect.

Journal articles on the topic 'OpenID Connect'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'OpenID Connect.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Navas, Jorge, and Marta Beltrán. "Understanding and mitigating OpenID Connect threats." Computers & Security 84 (July 2019): 1–16. http://dx.doi.org/10.1016/j.cose.2019.03.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deeptha, R., and Rajeswari Mukesh. "Extending OpenID Connect Towards Mission Critical Applications." Cybernetics and Information Technologies 18, no. 3 (September 1, 2018): 93–110. http://dx.doi.org/10.2478/cait-2018-0041.

Full text
Abstract:
Abstract Single Sign-On (SSO) decreases the complexity and eases the burden of managing many accounts with a single authentication mechanism. Mission critical application such as banking demands highly trusted identity provider to authenticate its users. The existing SSO protocol such as OpenID Connect protocol provides secure SSO but it is applicable only in the consumer-to-social-network scenarios. Owing to stringent security requirements, the SSO for banking service necessitates a highly trusted identity provider and a secured private channel for user access. The banking system depends on a dedicated central banking authority which controls the monetary policy and it must assume the role of the identity provider. This paper proposes an extension of OpenID Connect protocol that establishes a central identity provider for bank users, which facilitates the users to access different accounts using single login information. The proposed Enhanced OpenID Connect (EOIDC) modifies the authorization code flow of OpenID Connect to build a secure channel from a single trusted identity provider that supports multiple banking services. Moreover, the EOIDC tightens the security mechanism with the help of SAT to avoid impersonation attack using replay and redirect. The formal security analysis and validation demonstrate the strength of the EOIDC against possible attacks such as impersonation, eavesdropping, and a brute force login. The experimental results reveal that the proposed EOIDC system is efficient in providing secured SSO protocol for banking services.
APA, Harvard, Vancouver, ISO, and other styles
3

Alsadeh, Ahmad, Nasri Yatim, and Yousef Hassouneh. "A Dynamic Federated Identity Management Using OpenID Connect." Future Internet 14, no. 11 (November 21, 2022): 339. http://dx.doi.org/10.3390/fi14110339.

Full text
Abstract:
Identity federation allows one to link a user’s digital identities across several identity management systems. Federated identity management (FIM) ensures that users have easy access to the available resources. However, scaling FIM to numerous partners is a challenging process due to the interoperability issue between different federation architectures. This study proposes a dynamic identity federation model to eliminate the manual configuration steps needed to establish an organizational identity federation by utilizing the OpenID Connect (OIDC) framework. The proposed model consists of three major steps to establish dynamic FIM: first, the discovery of the OpenID service provider, which indicates the location of the partner organization; second, the registration of the OpenID relying party, which allows the organization and its partner to negotiate information for establishing the federation; finally, establishing the dynamic trust federation. The proposed dynamic FIM model allows applications to provide services to end-users coming from various domains while maintaining a trust between clients and service providers. Through our proposed dynamic identity federation model, organizations can save hundreds of hours by achieving dynamic federation in runtime and serving a large number of end-users.
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Weina, Kamran Sartipi, Hassan Sharghigoorabi, David Koff, and Peter Bak. "OpenID Connect as a security service in cloud-based medical imaging systems." Journal of Medical Imaging 3, no. 2 (June 16, 2016): 026501. http://dx.doi.org/10.1117/1.jmi.3.2.026501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sujanani, Tarun, and Smitha Vinod. "Implementation of OpenIdconnect and OAuth 2.0 to create SSO for educational institutes." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.6.10142.

Full text
Abstract:
Increase in the number of users is directly proportional to the need of verifying them. This means that any user using any website or application has to be authenticated first; this leads to the creation of multiple credentials of one user. Now if these different websites or applications are connected or belong to one single organization like a college or school, a lot of redundancy of data is there. Along with this, each user has to remember a wide range of credentials for different applications/websites. So in this paper, we address the issue of redundancy and user related problems by introducing SSO using OpenId Connect in educational institutes. We aim to mark the difference between the traditional system and proposed login by testing it on a group of users.
APA, Harvard, Vancouver, ISO, and other styles
6

Villarán, Carlos, and Marta Beltrán. "User-Centric Privacy for Identity Federations Based on a Recommendation System." Electronics 11, no. 8 (April 14, 2022): 1238. http://dx.doi.org/10.3390/electronics11081238.

Full text
Abstract:
Specifications such as SAML, OAuth, OpenID Connect and Mobile Connect are essential for solving identification, authentication and authorisation in contexts such as mobile apps, social networks, e-commerce, cloud computing or the Internet of Things. However, end-users relying on identity providers to access resources, applications or services lose control over the Personally Identifiable Information (PII) they share with the different providers composing identity federations. This work proposes a user-centric approach based on a recommendation system to support users in making privacy decisions such as selecting service providers or choosing their privacy settings. The proposed Privacy Advisor gives end-users privacy protection by providing personalised recommendations without compromising the identity federations’ functionalities or requiring any changes in their underlying specifications. A proof of concept of the proposed recommendation system is presented to validate and evaluate its utility and feasibility.
APA, Harvard, Vancouver, ISO, and other styles
7

Corre, Kevin, Olivier Barais, Gerson Sunyé, Vincent Frey, and Jean-Michel Crom. "Why can’t users choose their identity providers on the web?" Proceedings on Privacy Enhancing Technologies 2017, no. 3 (July 1, 2017): 75–89. http://dx.doi.org/10.1515/popets-2017-0029.

Full text
Abstract:
Abstract Authentication delegation is a major function of the modern web. Identity Providers (IdP) acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue that increases the privacy violation is the lack of choice for the end-user to select its own IdP. Indeed, on many web-applications, the end-user can only select between a subset of IdPs, in most cases Facebook or Google. In this paper, we analyze this phenomena, in particular why the end-user cannot easily select its preferred IdP, though there exists standards in this field such as OpenID Connect and OAuth 2? To lead this analysis, we conduct three investigations. The first one is a field survey on OAuth 2 and OpenID Connect scope usage by web sites to understand if scopes requested by websites could allow for user defined IdPs. The second one tries to understand whether the problem comes from the OAuth 2 protocol or its implementations by IdP. The last one tries to understand if trust relations between websites and IdP could prevent the end user to select its own IdP. Finally, we sketch possible architecture for web browser based identity management, and report on the implementation of a prototype.
APA, Harvard, Vancouver, ISO, and other styles
8

Karavakis, Edward, Andrea Manzi, Maria Arsuaga Rios, Oliver Keeble, Carles Garcia Cabot, Michal Simon, Mihai Patrascoiu, and Aris Angelogiannopoulos. "FTS improvements for LHC Run-3 and beyond." EPJ Web of Conferences 245 (2020): 04016. http://dx.doi.org/10.1051/epjconf/202024504016.

Full text
Abstract:
The File Transfer Service (FTS) developed at CERN and in production since 2014, has become a fundamental component for the LHC experiments and is tightly integrated with experiment frameworks. Starting from the beginning of 2018 with the participation to the European Commission funded project eXtreme Data Cloud (XDC) and the activities carried out in the context of the WLCG DOMA TPC and QoS working groups, a series of new developments and improvements have been planned and performed taking also into account the requirements from the experiments in preparation for the LHC Run-3. This paper provides a detailed overview of these developments; more specifically, the integration with OpenID Connect (OIDC), the QoS integration, the service scalability enhancements, the support for XRootD and HTTP Third Party Copy (TPC) transfers along with the integration with the new CERN Tape Archive (CTA) system.
APA, Harvard, Vancouver, ISO, and other styles
9

Primbs, Jonas, Winfried Ilg, Annika Thierfelder, Björn Severitt, Carolin Sarah Hohnecker, Annika Kristin Alt, Anja Pascher, et al. "The SSTeP-KiZ System—Secure Real-Time Communication Based on Open Web Standards for Multimodal Sensor-Assisted Tele-Psychotherapy." Sensors 22, no. 24 (December 7, 2022): 9589. http://dx.doi.org/10.3390/s22249589.

Full text
Abstract:
In this manuscript, we describe the soft- and hardware architecture as well as the implementation of a modern Internet of Medical Things (IoMT) system for sensor-assisted telepsychotherapy. It enables telepsychotherapy sessions in which the patient exercises therapy-relevant behaviors in their home environment under the remote supervision of the therapist. Wearable sensor information (electrocardiogram (ECG), movement sensors, and eye tracking) is streamed in real time to the therapist to deliver objective information about specific behavior-triggering situations and the stress level of the patients. We describe the IT infrastructure of the system which uses open standards such as WebRTC and OpenID Connect (OIDC). We also describe the system’s security concept, its container-based deployment, and demonstrate performance analyses. The system is used in the ongoing study SSTeP-KiZ (smart sensor technology in telepsychotherapy for children and adolescents with obsessive-compulsive disorder) and shows sufficient technical performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Tharun Sai, Vaddi, D. Kalyan, U. Chaitanya, and Dr D. Vijaya Lakshmi. "VACCINE REGISTRATION SYSTEM INTEGRATED WITH KEYCLOAK." International Journal Of Trendy Research In Engineering And Technology 06, no. 05 (2022): 01–05. http://dx.doi.org/10.54473/ijtret.2022.6501.

Full text
Abstract:
The objective of this paper is to provide an online registration system for covid-19 vaccination. In this crisis, it will be difficult to register in person and get vaccinated after waiting in a queue for a long period; thus, registering online is the safest and most convenient way to schedule slots on a convenient date and get vaccinated. We built this application using spring boot, which allows developers to directly get into coding without wasting time in setting up and configuring the environment. For authentication and authorization, we integrated it with keycloak, a third-party service, which is a simple way to make our webbased apps more secure and Keycloak provides distinctive features to the application like single Single-Sign On, OpenID Connect Support, Social Logins and many more. So, this is a web-based service where any individual can conveniently schedule their slots from anywhere according to the availability in their desired locations.
APA, Harvard, Vancouver, ISO, and other styles
11

Dona, Rizart, and Riccardo Di Maria. "The ESCAPE Data Lake: The machinery behind testing, monitoring and supporting a unified federated storage infrastructure of the exabyte-scale." EPJ Web of Conferences 251 (2021): 02060. http://dx.doi.org/10.1051/epjconf/202125102060.

Full text
Abstract:
The EU-funded ESCAPE project aims at enabling a prototype federated storage infrastructure, a Data Lake, that would handle data on the exabyte-scale, address the FAIR data management principles and provide science projects a unified scalable data management solution for accessing and analyzing large volumes of scientific data. In this respect, data transfer and management technologies such as Rucio, FTS and GFAL are employed along with monitoring enabling solutions such as Grafana, Elasticsearch and perf- SONAR. This paper presents and describes the technical details behind the machinery of testing and monitoring of the Data Lake – this includes continuous automated functional testing, network monitoring and development of insightful visualizations that reflect the current state of the system. Topics that are also addressed include the integration with the CRIC information system as well as the initial support for token based authentication / authorization by using OpenID Connect. The current architecture of these components is provided and future enhancements are discussed.
APA, Harvard, Vancouver, ISO, and other styles
12

Bockelman, Brian, Andrea Ceccanti, Fabrizio Furano, Paul Millar, Dmitry Litvintsev, and Alessandra Forti. "Third-party transfers in WLCG using HTTP." EPJ Web of Conferences 245 (2020): 04031. http://dx.doi.org/10.1051/epjconf/202024504031.

Full text
Abstract:
Since its earliest days, the Worldwide LHC Computational Grid (WLCG) has relied on GridFTP to transfer data between sites. The announcement that Globus is dropping support of its open source Globus Toolkit (GT), which forms the basis for several FTP client and servers, has created an opportunity to reevaluate the use of FTP. HTTP-TPC, an extension to HTTP compatible with WebDAV, has arisen as a strong contender for an alternative approach. In this paper, we describe the HTTP-TPC protocol itself, along with the current status of its support in different implementations, and the interoperability testing done within the WLCG DOMA working group’s TPC activity. This protocol also provides the first real use-case for token-based authorisation for this community. We will demonstrate the benefits of such authorisation by showing how it allows HTTP-TPC to support new technologies (such as OAuth, OpenID Connect, Macaroons and SciTokens) without changing the protocol. We will also discuss the next steps for HTTP-TPC and the plans to use the protocol for WLCG transfers.
APA, Harvard, Vancouver, ISO, and other styles
13

Лавина, Татьяна Ароновна, and Николай Игоревич Степанов. "ANALYSIS OF DISTANCE LEARNING SYSTEMS ON THE EXAMPLE OF STATE UNIVERSITIES IN THE CHUVASH REPUBLIC." Bulletin of the Chuvash State Pedagogical University named after I Y Yakovlev, no. 1(110) (March 30, 2021): 156–66. http://dx.doi.org/10.37972/chgpu.2021.110.1.019.

Full text
Abstract:
Данная статья посвящена исследованию систем дистанционного обучения в вузах Чувашской Республики, определению основных функций систем управления дистанционным обучением. Проведен анализ систем дистанционного взаимодействия со студентами в федеральных вузах Чувашской Республики. С целью формирования требований к функциям современной единой универсальной платформы дистанционного взаимодействия в университете проведен анализ корпоративной платформы, объединяющей в рабочем пространстве чат, встречи, заметки и вложения MS Teams, позволяющей организовывать дистанционное обучение. На примере веб-ресурсов для поддержки организации дистанционного обучения государственных университетов Чувашской Республики, таких как система управления курсами, использующая лицензию GNU GPL Moodle, системы видеоконференций Big Blue Button, рассматриваются их функциональные возможности и недостатки, выявляются ключевые особенности построения единого информационного пространства вуза на основе идеи использования инструментов образовательных платформ в обеспечении электронной поддержки дистанционного обучения. Представлены преимущества интеграции систем LMS Moodle и MS Teams для построения интерактивного формата обучения на примере построения единой образовательной среды в ЧГПУ им. И. Я. Яковлева. Рассмотрено внедрение единой учетной записи для организации принципа единой точки доступа к информационным системам дистанционного обучения для построения единой электронной образовательной среды университета на базе технологии OpenID Connect. This article is devoted to the study of distance learning systems in universities of the Chuvash Republic, the definition of the main functions of distance learning systems. It presents the analysis of systems of distance learning interaction with students in federal universities of the Chuvash Republic. In order to form the requirements for the functions of a modern unified universal platform for distance learning interaction at the university, the authors analysed the corporate platform that combines chat, meetings, notes and attachments of MS Teams in the workspace. Using the example of web resources to support the organization of distance learning of state universities of the Chuvash Republic, such as the course management system using the GNU GPL Moodle license, the Big Blue Button video conferencing systems, their functionality and shortcomings are considered, the key features of building a unified information space of the university based on the idea of using the tools of educational platforms in providing electronic support for distance learning are identified. The advantages of integrating the LMS Moodle and MS Teams systems for building an interactive learning format are presented on the example of building a unified educational environment at I. Yakovlev CHSPU. The introduction of a single account for the organization of a single point of access to information systems of distance learning for the construction of a single electronic educational environment of the university based on OpenID Connect technology is considered.
APA, Harvard, Vancouver, ISO, and other styles
14

Ceccanti, Andrea, Enrico Vianello, and Francesco Giacomini. "Beyond X.509: Token-based authentication and authorization in practice." EPJ Web of Conferences 245 (2020): 03021. http://dx.doi.org/10.1051/epjconf/202024503021.

Full text
Abstract:
One of the key challenges identified by the HEP R&D roadmap for software and computing is the ability to integrate heterogeneous resources in support of the computing needs of HL-LHC. In order to meet this objective, a flexible Authentication and Authorization Infrastructure (AAI) has to be in place, to allow the secure composition of computing and storage resources provisioned across heterogeneous providers (e.g., Grid, private and commercial Clouds, HPC centers). At CHEP 2018, we presented how a flexible AAI based on modern, standard Web technologies (OpenID Connect, OAuth and JSON Web Tokens) and centered on the INDIGO Identity and Access Management (IAM) service could support the transition of the WLCG infrastructure to a token-based AAI. In the meanwhile, INDIGO IAM has been selected by the WLCG Management Board as the solution that will be adopted by LHC experiments, and is also at the core of the AAI envisioned to support the computing needs of the ESCAPE project. In this contribution, which represents a follow up to last-year plenary talk, we describe the work done recently on the IAM service to support WLCG requirements.
APA, Harvard, Vancouver, ISO, and other styles
15

Ceccanti, Andrea, Enrico Vianello, and Diego Michelotto. "Token-based authorization in StoRM WebDAV." EPJ Web of Conferences 245 (2020): 04020. http://dx.doi.org/10.1051/epjconf/202024504020.

Full text
Abstract:
At the end of May 2017 the Globus Alliance announced that the open-source Globus Toolkit (GT) would be no longer supported by the Globus team at the University of Chicago. This announcement had an obvious impact on WLCG, given the central role of the Globus Security Infrastructure (GSI) and GridFTP in the WLCG data management framework, so discussions started in the appropriate forums on the search for alternatives. At the same time, support for token-based authentication and authorization has emerged as a key requirement for storage elements powering WLCG data centers. In this contribution, we describe the work done to enable token-based authentication and authorization in the StoRM WebDAV service, describing and highlighting the differences between support for external OpenID connect providers, groupbased and capability-based authorization schemes, and locally-issued authorization tokens. We discuss how StoRM WebDAV token-based authorization is being exploited in several contexts, from WLCG DOMA activities to other scientific experiments hosted at the INFN Tier-1 data center. In this contribution, we also describe the methodology used to compare Globus GridFTP and StoRM WebDAV and we present initial results confirming how HTTP represent a viable alternative to GridFTP for data transfers also performance-wise.
APA, Harvard, Vancouver, ISO, and other styles
16

de Almeida, Murilo Góes, and Edna Dias Canedo. "Authentication and Authorization in Microservices Architecture: A Systematic Literature Review." Applied Sciences 12, no. 6 (March 16, 2022): 3023. http://dx.doi.org/10.3390/app12063023.

Full text
Abstract:
The microservice architectural style splits an application into small services, which are implemented independently, with their own deployment unit. This architecture can bring benefits, nevertheless, it also poses challenges, especially about security aspects. In this case, there are several microservices within a single system, it represents an increase in the exposure of the safety surface, unlike the monolithic style, there are several applications running independently and must be secured individually. In this architecture, microservices communicate with each other, sometimes in a trust relationship. In this way, unauthorized access to a specific microservice could compromise an entire system. Therefore, it brings a need to explore knowledge about issues of security in microservices, especially in aspects of authentication and authorization. In this work, a Systematic Literature Review is carried out to answer questions on this subject, involving aspects of the challenges, mechanisms and technologies that deal with authentication and authorization in microservices. It was found that there are few studies dealing with the subject, especially in practical order, however, there is a consensus that communication between microservices, mainly due to its individual and trustworthy characteristics, is a concern to be considered. To face the problems, mechanisms such as OAuth 2.0, OpenID Connect, API Gateway and JWT are used. Finally, it was found that there are few open-source technologies that implement the researched mechanisms, with some mentions of the Spring Framework.
APA, Harvard, Vancouver, ISO, and other styles
17

Spiga, Daniele, Enol Fernandez, Vincenzo Spinoso, Diego Ciangottini, Mirco Tracolli, Giacinto Donvito, Marica Antonacci, et al. "The DODAS Experience on the EGI Federated Cloud." EPJ Web of Conferences 245 (2020): 07033. http://dx.doi.org/10.1051/epjconf/202024507033.

Full text
Abstract:
The EGI Cloud Compute service offers a multi-cloud IaaS federation that brings together research clouds as a scalable computing platform for research accessible with OpenID Connect Federated Identity. The federation is not limited to single sign-on, it also introduces features to facilitate the portability of applications across providers: i) a common VM image catalogue VM image replication to ensure these images will be available at providers whenever needed; ii) a GraphQL information discovery API to understand the capacities and capabilities available at each provider; and iii) integration with orchestration tools (such as Infrastructure Manager) to abstract the federation and facilitate using heterogeneous providers. EGI also monitors the correct function of every provider and collects usage information across all the infrastructure. DODAS (Dynamic On Demand Analysis Service) is an open-source Platform-as-a-Service tool, which allows to deploy software applications over heterogeneous and hybrid clouds. DODAS is one of the so-called Thematic Services of the EOSC-hub project and it instantiates on-demand container-based clusters offering a high level of abstraction to users, allowing to exploit distributed cloud infrastructures with a very limited knowledge of the underlying technologies.This work presents a comprehensive overview of DODAS integration with EGI Cloud Federation, reporting the experience of the integration with CMS Experiment submission infrastructure system.
APA, Harvard, Vancouver, ISO, and other styles
18

Ziegler, Erik, Trinity Urban, Danny Brown, James Petts, Steve D. Pieper, Rob Lewis, Chris Hafey, and Gordon J. Harris. "Open Health Imaging Foundation Viewer: An Extensible Open-Source Framework for Building Web-Based Imaging Applications to Support Cancer Research." JCO Clinical Cancer Informatics, no. 4 (September 2020): 336–45. http://dx.doi.org/10.1200/cci.19.00131.

Full text
Abstract:
PURPOSE Zero-footprint Web architecture enables imaging applications to be deployed on premise or in the cloud without requiring installation of custom software on the user’s computer. Benefits include decreased costs and information technology support requirements, as well as improved accessibility across sites. The Open Health Imaging Foundation (OHIF) Viewer is an extensible platform developed to leverage these benefits and address the demand for open-source Web-based imaging applications. The platform can be modified to support site-specific workflows and accommodate evolving research requirements. MATERIALS AND METHODS The OHIF Viewer provides basic image review functionality (eg, image manipulation and measurement) as well as advanced visualization (eg, multiplanar reformatting). It is written as a client-only, single-page Web application that can easily be embedded into third-party applications or hosted as a standalone Web site. The platform provides extension points for software developers to include custom tools and adapt the system for their workflows. It is standards compliant and relies on DICOMweb for data exchange and OpenID Connect for authentication, but it can be configured to use any data source or authentication flow. Additionally, the user interface components are provided in a standalone component library so that developers can create custom extensions. RESULTS The OHIF Viewer and its underlying components have been widely adopted and integrated into multiple clinical research platforms (e,g Precision Imaging Metrics, XNAT, LabCAS, ISB-CGC) and commercial applications (eg, Osirix). It has also been used to build custom imaging applications (eg, ProstateCancer.ai, Crowds Cure Cancer [presented as a case study]). CONCLUSION The OHIF Viewer provides a flexible framework for building applications to support imaging research. Its adoption could reduce redundancies in software development for National Cancer Institute–funded projects, including Informatics Technology for Cancer Research and the Quantitative Imaging Network.
APA, Harvard, Vancouver, ISO, and other styles
19

Jalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (June 14, 2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.

Full text
Abstract:
Abstract Motivation Large biomedical datasets, such as those from genomics and imaging, are increasingly being stored on commercial and institutional cloud computing platforms. This is because cloud-scale computing resources, from robust backup to high-speed data transfer to scalable compute and storage, are needed to make these large datasets usable. However, one challenge for large-scale biomedical data on the cloud is providing secure access, especially when datasets are distributed across platforms. While there are open Web protocols for secure authentication and authorization, these protocols are not in wide use in bioinformatics and are difficult to use for even technologically sophisticated users. Results We have developed a generic and extensible approach for securely accessing biomedical datasets distributed across cloud computing platforms. Our approach combines OpenID Connect and OAuth2, best-practice Web protocols for authentication and authorization, together with Galaxy (https://galaxyproject.org), a web-based computational workbench used by thousands of scientists across the world. With our enhanced version of Galaxy, users can access and analyze data distributed across multiple cloud computing providers without any special knowledge of access/authorization protocols. Our approach does not require users to share permanent credentials (e.g. username, password, API key), instead relying on automatically generated temporary tokens that refresh as needed. Our approach is generalizable to most identity providers and cloud computing platforms. To the best of our knowledge, Galaxy is the only computational workbench where users can access biomedical datasets across multiple cloud computing platforms using best-practice Web security approaches and thereby minimize risks of unauthorized data access and credential use. Availability and implementation Freely available for academic and commercial use under the open-source Academic Free License (https://opensource.org/licenses/AFL-3.0) from the following Github repositories: https://github.com/galaxyproject/galaxy and https://github.com/galaxyproject/cloudauthz.
APA, Harvard, Vancouver, ISO, and other styles
20

Kylänpää, Markku, and Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.

Full text
Abstract:
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnected devices to factories increasing among others the challenge of managing their software versions and giving attackers new possibilities to exploit various software vulnerabilities. Factory networks were earlier isolated from the Internet. However, this separation is no longer valid and there can be connections that allow intruders to penetrate into information systems of factories. Another issue is that although factories typically are physically isolated, it is not necessarily safe to assume that physical security is in good shape as the novel supply networks comprise subcontracted activities and temporary work force. Another threat can also arise from unauthorized monitoring of devices and the unauthorized replacement of existing ones. Based on the previous, it is crucial that IIoT security should be built into factories of the future (FoF) right from the design phase and even low-end devices need to be supported. Trusted computing concept called remote attestation should be used. Remote attestation allows remote parties to verify the integrity of each system component. System components should include trusted hardware components that can be used to measure executable software. The term measurement means calculating the cryptographic hash of the binary component before passing control to it. Trusted hardware components should also have a mechanism to protect the integrity of the measurement list and cryptographic keys that can be used to sign integrity assertions. The verifier part should have a storage of reference integrity metrics identifying the expected values of these measurements. Deploying trusted computing and remote attestation concepts to industrial automation is not straightforward. Even if it is possible to use remote attestation with suitable hardware components, it is not clear how remote attestation should be integrated with various operational technology (OT) industrial automation protocols. Approaches to use remote attestation with existing industrial automation protocols (e.g., OPC UA) is discussed. Advanced identity and access management (e.g., OAuth2, OpenID Connect) can be used to combine integrity measurements with device identity information so that the remote attestation process is triggered by authentication during the first transaction. The focus is on machine-to-machine (M2M) communications with immutable device identities and integrity evidence transfer.
APA, Harvard, Vancouver, ISO, and other styles
21

Sharma, Amit. "An Approach to Facebook Post Analytics Using Python and Advance Open Source Tools." International Journal of Emerging Research in Management and Technology 6, no. 6 (June 29, 2018): 78. http://dx.doi.org/10.23956/ijermt.v6i6.249.

Full text
Abstract:
The paper portrays the utilization of tools for data gathering and extraction that permits researchers to fare data in standard document groups from various areas of the facebook long range informal communication benefit. Kinship networks, gatherings, and pages can subsequently be breaking down quantitatively and subjectively with respect to demographical, post-demographical, and social qualities. The paper gives a review over expository headings opened up by the data made accessible, talks about stage particular parts of data extraction through the official Application Programming Interface, and quickly connects with the troublesome moral contemplations connected to this sort of research.
APA, Harvard, Vancouver, ISO, and other styles
22

Arafat, Arafat, Silvia Ratna, and Wagino Wagino. "DETEKSI MASKER WAJAH SECARA REALTIME DENGAN ARDUINO UNTUK MENCEGAH PENYEBARAN COVID-19." Technologia : Jurnal Ilmiah 13, no. 4 (October 3, 2022): 375. http://dx.doi.org/10.31602/tji.v13i4.8803.

Full text
Abstract:
The emergence of the COVID-19 pandemic has had a lasting impact on countries around the world since 2019. Face mask detection has been a significant advance in the field of image processing and deep learning studies. Many face detection models have been designed using different algorithms and techniques. The approach proposed in this proposal is developed to prevent people without masks from entering public places (i.e. Malls, Universities, Offices, …etc) by detecting face masks using deep learning, TensorFlow, Keras, and OpenCV methods and sending a signal to the connected Arduino device. to the door to be opened. To detect a person's face in real-time and identify whether the person is wearing a mask or not. This method uses datasets collected from various sources.
APA, Harvard, Vancouver, ISO, and other styles
23

Gustafsson, Jessica. "Domestic Connectivity: Media, Gender and the Domestic Sphere in Kenya." Media and Communication 6, no. 2 (June 29, 2018): 188–98. http://dx.doi.org/10.17645/mac.v6i2.1295.

Full text
Abstract:
This article explores how increased media access and use influences Kenyan women’s everyday life and alters the domestic space. Based on 30 in-depth interviews with women in Uasin Gishu County, Kenya, the article demonstrates that women have incorporated newly gained media into their daily lives and routines. Increased media access has opened up the home and turned the domestic sphere from a secluded place into a connected space in which women can receive input from, connect with and interact with the world beyond their immediate surroundings whilst simultaneously remaining at home and fulfilling their traditional gender roles. Women’s media use thus reinforces their connection to the domestic sphere and the gendered division of labour. Although it has the potential to challenge gender inequalities, the extent to which this occurs depends on the individual woman’s ability to act on the imaginaries and ideas that media carry.
APA, Harvard, Vancouver, ISO, and other styles
24

Shafi, Gowher. "Object Tracking Using HSV Values and OpenCV." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 594–99. http://dx.doi.org/10.22214/ijraset.2021.39238.

Full text
Abstract:
Abstract: This research shows how to use colour and movement to automate the process of recognising and tracking things. Video tracking is a technique for detecting a moving object over a long distance using a camera. The main purpose of video tracking is to connect target objects in subsequent video frames. The connection may be particularly troublesome when things move faster than the frame rate. Using HSV colour space values and OpenCV in different video frames, this study proposes a way to track moving objects in real-time. We begin by calculating the HSV value of an item to be monitored, and then we track the object throughout the testing step. The items were shown to be tracked with 90 percent accuracy. Keywords: HSV, OpenCV, Object tracking, Video frames, GUI
APA, Harvard, Vancouver, ISO, and other styles
25

Cotoi, Calin. "Cholera, Health for All, Nation-Building, and Racial Degeneration in Nineteenth-Century Romania." East Central Europe 43, no. 1-2 (September 16, 2016): 161–87. http://dx.doi.org/10.1163/18763308-04302005.

Full text
Abstract:
The emergence of social modernity in the Romanian principalities can be traced to the founding of quarantinist outposts against the last waves of plague and the first waves of cholera. The crisis of this sanitary arrangement opened the way for a series of failed but productive projects of modernization. The collective political body was imagined and created through the nationalization of the medical profession and the attempts to create a sanitary social body. The failure to connect urban and rural bodies inside a democratic all-embracing network opened up spaces for discourses questioning the identity of the collective body. Was there a “Romanian element”? What did that mean and was it degenerating? Demographic anti-Semitism and the first attempts to think of socioeconomic and sanitary failures in terms of racial degeneracy emerged from the fissures of the national sanitary system. Bacteriology was able to partially absorb these critiques and propose a larger interventionist project in the space opened by the old-style sanitary police.
APA, Harvard, Vancouver, ISO, and other styles
26

Demulder, Elizabeth K., and Stacia M. Stribling. "‘A Big Door Opened for Us’: Parents' Perceptions of Comprehensive Preschool." Contemporary Issues in Early Childhood 13, no. 4 (January 1, 2012): 328–43. http://dx.doi.org/10.2304/ciec.2012.13.4.328.

Full text
Abstract:
This qualitative research study was designed to explore the perceptions of parents with low income regarding the effects of involvement in a comprehensive preschool program on their children's development and on the families' quality of life. A purposeful sample of parents who became actively involved in the preschool community was interviewed about their experiences and the experiences of their children. These interviews were analyzed using the constant comparative method for emerging themes related to their experiences of the preschool. Parents' perspectives provided important insights into the processes that influence what they identified as positive outcomes. These insights, all connected to a larger theme of empowerment, included: (1) replacing isolation with affiliation, (2) increased self-confidence, (3) enhanced opportunity and ability to set goals and develop skills that promote self-sufficiency and goal attainment, and (4) empowering parents to empower their children through positive parenting. The evidence suggests that preschool structures and processes can enhance the development of the whole family by serving as a support system, and by nurturing relationships that are at the core of academic success. The study contributes to the research base on the effects of comprehensive preschool approaches to support families living in poverty.
APA, Harvard, Vancouver, ISO, and other styles
27

Wigzell, Freya. "‘opened out […] like an oyster shell': the Roach bed Portland stone cladding of the Smithsons’ Economist Building." Architectural Research Quarterly 24, no. 2 (June 2020): 169–82. http://dx.doi.org/10.1017/s135913552000024x.

Full text
Abstract:
Alison & Peter Smithson's Economist Building in London (1960–1964) has been much written about, but one of its most distinctive features – the Roach bed Portland stone cladding – has been relatively little discussed. Although there have been various retrospective explanations for the choice of this previously unused stone, whose surface is marked by cavities of now vanished shells, no direct evidence from the time fully accounts for the decision. Reliance upon inference, and upon retrospective statements, mean that no definitive explanation for the choice is now possible. Some new evidence from archives and interviews, and a re-examination of the contemporary concerns of the Smithsons, and of their artist friends Eduardo Paolozzi and Nigel Henderson, fellow members of the Independent Group during the 1950s, however, suggest a plausible, though speculative, interpretation. When considered in light of the Smithsons' and their friends' interests in pattern, in hidden orders, and in the problems of ‘human association’, the choice of Roach bed Portland stone seems less surprising. More than just ‘pretty’, as Peter Smithson was later to describe the material, it can be seen to connect with a fascination with underlying, non-human, systems of order, while at the same time providing a particularly expressive form of protection for human identity in the modern city.
APA, Harvard, Vancouver, ISO, and other styles
28

McClean, Conor, and Gareth W. Davison. "Circadian Clocks, Redox Homeostasis, and Exercise: Time to Connect the Dots?" Antioxidants 11, no. 2 (January 28, 2022): 256. http://dx.doi.org/10.3390/antiox11020256.

Full text
Abstract:
Compelling research has documented how the circadian system is essential for the maintenance of several key biological processes including homeostasis, cardiovascular control, and glucose metabolism. Circadian clock disruptions, or losses of rhythmicity, have been implicated in the development of several diseases, premature ageing, and are regarded as health risks. Redox reactions involving reactive oxygen and nitrogen species (RONS) regulate several physiological functions such as cell signalling and the immune response. However, oxidative stress is associated with the pathological effects of RONS, resulting in a loss of cell signalling and damaging modifications to important molecules such as DNA. Direct connections have been established between circadian rhythms and oxidative stress on the basis that disruptions to circadian rhythms can affect redox biology, and vice versa, in a bi-directional relationship. For instance, the expression and activity of several key antioxidant enzymes (SOD, GPx, and CAT) appear to follow circadian patterns. Consequently, the ability to unravel these interactions has opened an exciting area of redox biology. Exercise exerts numerous benefits to health and, as a potent environmental cue, has the capacity to adjust disrupted circadian systems. In fact, the response to a given exercise stimulus may also exhibit circadian variation. At the same time, the relationship between exercise, RONS, and oxidative stress has also been scrutinised, whereby it is clear that exercise-induced RONS can elicit both helpful and potentially harmful health effects that are dependent on the type, intensity, and duration of exercise. To date, it appears that the emerging interface between circadian rhythmicity and oxidative stress/redox metabolism has not been explored in relation to exercise. This review aims to summarise the evidence supporting the conceptual link between the circadian clock, oxidative stress/redox homeostasis, and exercise stimuli. We believe carefully designed investigations of this nexus are required, which could be harnessed to tackle theories concerned with, for example, the existence of an optimal time to exercise to accrue physiological benefits.
APA, Harvard, Vancouver, ISO, and other styles
29

Buakwan, Narawadee, Parichart Visuthisamajarn, and Amporn Viriyakoson. "Cultural Tourism Guidelines In Klonghae Floating Market, Thailand." International Journal of Management & Information Systems (IJMIS) 17, no. 3 (May 24, 2013): 163. http://dx.doi.org/10.19030/ijmis.v17i3.7864.

Full text
Abstract:
This study was toprovide guidelines for managing cultural tourism in the Klonghae FloatingMarket, Klonghae sub-district, Hatyai district, Songkhla province, Thailand. Both qualitative and quantitative methods were used tocollect data. It was discovered that the floating market, which opened inAugust 2008, was managed by the local government to support environmentalconservation and economic development in the community. Our guidelinesemphasized the need to connect the floating market with other touristattractions within the Klonghae municipal area to update information provided topotential tourists. It was discovered that visitorswant more information about temples and livelihoods.
APA, Harvard, Vancouver, ISO, and other styles
30

Ferran, Bronac. "Sheltering from the Storm—Artistic Residencies and Environmental Crisis." Leonardo 45, no. 2 (April 2012): 194–95. http://dx.doi.org/10.1162/leon_a_00306.

Full text
Abstract:
Conditions of crisis can be fertile soil for social transformation. The Lovely Weather project in Donegal, northwest Ireland, brought artists into residence in localities where changing socio-economic and awareness of shifting environmental conditions opened up space for different cooperative relations. Donegal, bounded by the Atlantic, sitting between the north and south of Ireland, is an ambiguous in-between region with strong yet undervalued traditions relating to the sea and land. Drawing from a keynote presentation, this paper considers how residency models can dynamically connect poetics of place with broader environmental influences.
APA, Harvard, Vancouver, ISO, and other styles
31

Widiasari, Cyntia. "Sistem Kontrol Otomatis Pagar Rumah Berbasis Internet of Things (IoT)." Jurnal Elektro dan Mesin Terapan (ELEMENTER), Vol. 8 No. 2 (2022) (November 30, 2022): 162–74. http://dx.doi.org/10.35143/elementer.v8i2.5748.

Full text
Abstract:
The fence is the main part of a house in terms of security. The conventional fence is opened and closed manually by the home owner. In rainy conditions this will be very ineffective and inefficient because the home owner has to get out of the vehicle to open the fence. This problem underlies the idea of making an automatic fence opening and closing system using a smartphone by utilizing Internet of Things (IoT) technology. Smartphone is useful as a NodeMCU controller contained in the ESP8266 WiFi module via an internet connection to connect to the blynk application. Relay is used as a switch that will command the motor to rotate when it gets a command from NodeMCU. Changes in relay conditions will cause the 12volt 200rpm DC motor to rotate, so the fence will move opened and closed. The movement of the servo motor also causes the turnstile to lock after the fence is closed. In order for the system to work properly, the revolutions per minute (RPM) of the motor requires a supply voltage of 12V. When the fence is opened, the motor speed is 53RPM. When closed, the motor speed is 49RPM. In the process of locking and opening the fence, the servo motor takes about 2 seconds.
APA, Harvard, Vancouver, ISO, and other styles
32

Hadeed, Ali Farhan, Laith Khalid Al-Hadithy, and Riyadh J. Aziz. "Experimental Investigation on Behavior of Composite Open Web Steel Joists." Al-Nahrain Journal for Engineering Sciences 21, no. 3 (September 1, 2018): 393–404. http://dx.doi.org/10.29194/njes.21030393.

Full text
Abstract:
The composite opened web steel joist supported floor systems have been common for many years. It is economic and has light weight and can embed the electrical conduit, ductwork and piping, eliminating the need for these to pass under the member, consequently eliminate the height between floors. In order to study the joist strength capacity under the various conditions, it had been fabricated seven joists composed of the steel and concrete slab connected to the top chord by shear connectors (headed studs). These joist have 2820 mm length c/c of the supports and 235 mm overall depth. In the present study, six variable parameters are adopted (Studs distribution, Degree of shear connection, Degree of the web inclination, Shape of the web, Density of concrete for slab and length of the shear connector). The test results exhibited that minimum strength capacity was 160kN for light weight joist and maximum capacity was 225kN for joist of long shear connectors at failure. The results were compared by ultimate flexural model by Azmi.
APA, Harvard, Vancouver, ISO, and other styles
33

Stoker, Thijs, Theo J. Klinkenberg, Alexander H. Maass, and Massimo A. Mariani. "Video-Assisted Implantation of a Left Ventricular Lead and Intrathoracic Tunneling to a Right-Sided CRT-D Device." Innovations: Technology and Techniques in Cardiothoracic and Vascular Surgery 6, no. 5 (September 2011): 341–43. http://dx.doi.org/10.1097/imi.0b013e3182372464.

Full text
Abstract:
We describe two cases in which a biventricular implantable cardioverter defibrillator for cardiac resynchronization therapy had to be placed on the right side due to unsuitability of the left subclavian vein. Endocardial implantation of a left ventricular lead through the coronary sinus was previously attempted but was unsuccessful. Implantation of the epicardial left ventricular pacing lead was performed through video-assisted thoracic surgery on the left side. The connector end of the left ventricular pacing lead was tunnelized through the anterior mediastinum into the right pleural space. The right-sided pocket was then opened. A tunnel was created from the pocket to the thoracic wall, and the pleural space was entered over the second rib. The lead was retrieved from the right pleural space and connected with the Cardiac resynchronization therapy-device (CRT-D). Both procedures and postoperative periods were uneventful. Intrathoracic left-to-right tunneling of an epicardial left ventricular lead by video-assisted thoracic surgery is feasible and safe. It provides an alternative to subcutaneous tunneling.
APA, Harvard, Vancouver, ISO, and other styles
34

Feir, Donna, Rachel L. Wellhausen, and Calvin Thrall. "Ownership and Trust in Banks: Evidence from the First Bank in an American Indian Nation." AEA Papers and Proceedings 111 (May 1, 2021): 227–32. http://dx.doi.org/10.1257/pandp.20211015.

Full text
Abstract:
In collaboration with an American Indian nation, we conducted a survey that is the first of its kind in Indian Country. The survey explored tribal members' financial experiences in the months before the first bank opened on their reservation. In this article, we connect respondents' reported ex ante trust in banks to their support for the new bank. Descriptively, respondents are highly supportive of the new bank whatever their ex ante trust in banks, but the relationship is nonlinear. Native ownership seems to be particularly silent to those in the middle or low end of the trust distribution.
APA, Harvard, Vancouver, ISO, and other styles
35

LAW, SANDY S. C. "LEPTOGENESIS: THE ELECTROMAGNETIC VERSION." Modern Physics Letters A 25, no. 11n12 (April 20, 2010): 994–1003. http://dx.doi.org/10.1142/s0217732310000150.

Full text
Abstract:
In this work, we explore the possibility of leptogenesis beyond the standard Yukawa-mediated decays by considering a scenario where effective electromagnetic dipole operators that connect the light and heavy neutrinos play an important role. Through these operators, new decay channels for the postulated heavy neutrinos are opened up, and consequently, such L- and CP-violating processes can lead to the generation of the correct baryon asymmetry of the universe. In addition, it has been found that the relationship of the leptogenesis scale to the light neutrino masses is very similar to that for the standard leptogenesis setup.
APA, Harvard, Vancouver, ISO, and other styles
36

Szczuka, Paulina. "Regular open arithmetic progressions in connected topological spaces on the set of positive integers." Glasnik Matematicki 49, no. 1 (June 8, 2014): 13–23. http://dx.doi.org/10.3336/gm.49.1.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kurniawan, Fani, Yulian Zetta Maulana, and Risa Farrid Christianti. "Sistem Kendali Level Ketinggian Air Berbasis Fuzzy Control Menggunakan Simulink." Techné : Jurnal Ilmiah Elektroteknika 21, no. 1 (April 11, 2022): 17–30. http://dx.doi.org/10.31358/techne.v21i1.287.

Full text
Abstract:
Today's technology shows very significant developments in automation systems. Filling water in a tank is a process that is widely used in the oil industry. The process of filling and draining water in a closed water tank will raise difficulty for the operator to control the water level in the tank. Therefore, we will create a system to control the water level using a fuzzy controller. To get the value of fuzzification from the difference in the value of the set point and defuzzification connected to the motor pump. Fuzzy design system was obtained by making methods, fuzzification, defuzzification, and rules. The use of ultrasonic sensors during the experiment caused a spike in value because the ultrasonic sensor had not detected water but had no significant effect on the response to altitude levels. When the valve is opened, the controller has an effect on the resulting response. The more the valve is opened, the worse the response will be but the system remains stable. The fuzzy output will be connected to the PLC which will be connected to the Kepserver and tank to regulate the flow rate to the tank. Matlab is connected with PLC devices using Kepserver. The best performance is found in the 2× reduction valve opening response test with a fuzzification range of 8000-24000 while the performance value of time rise is 66.458 s, settling time is 110 s, steady state error is -2%, and overshoot is 9%.
APA, Harvard, Vancouver, ISO, and other styles
38

Sadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "SOCIAL MEDIA FOR BEGINNERS." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 3 (March 30, 2018): 24. http://dx.doi.org/10.23956/ijarcsse.v8i3.564.

Full text
Abstract:
Social media (or social networking) is a universal phenomenon. It is the most popular online activity worldwide. It empowers people to share their opinions with others online.It has opened new ways of communication in the hyper-connected world. It has become an integral part of modern society as they provide means of interacting and socializing. This paper briefly introduces beginners to social media.
APA, Harvard, Vancouver, ISO, and other styles
39

Shen, Kuo-Fang, Aysha H. Osmani, Meera Govindaraghavan, and Stephen A. Osmani. "Mitotic regulation of fungal cell-to-cell connectivity through septal pores involves the NIMA kinase." Molecular Biology of the Cell 25, no. 6 (March 15, 2014): 763–75. http://dx.doi.org/10.1091/mbc.e13-12-0718.

Full text
Abstract:
Intercellular bridges are a conserved feature of multicellular organisms. In multicellular fungi, cells are connected directly via intercellular bridges called septal pores. Using Aspergillus nidulans, we demonstrate for the first time that septal pores are regulated to be opened during interphase but closed during mitosis. Septal pore–associated proteins display dynamic cell cycle–regulated locations at mature septa. Of importance, the mitotic NIMA kinase locates to forming septa and surprisingly then remains at septa throughout interphase. However, during mitosis, when NIMA transiently locates to nuclei to promote mitosis, its levels at septa drop. A model is proposed in which NIMA helps keep septal pores open during interphase and then closed when it is removed from them during mitosis. In support of this hypothesis, NIMA inactivation is shown to promote interphase septal pore closing. Because NIMA triggers nuclear pore complex opening during mitosis, our findings suggest that common cell cycle regulatory mechanisms might control septal pores and nuclear pores such that they are opened and closed out of phase to each other during cell cycle progression. The study provides insights into how and why cytoplasmically connected Aspergillus cells maintain mitotic autonomy.
APA, Harvard, Vancouver, ISO, and other styles
40

Ma, Qingyun, and Xubin Huang. "Research on recognizing required items based on opencv and machine learning." SHS Web of Conferences 140 (2022): 01016. http://dx.doi.org/10.1051/shsconf/202214001016.

Full text
Abstract:
Starting from the background of the outbreak of New Coronavirus, in order to realize the function of automatically identifying the required items by machine, the support vector machine algorithm in the neural network and the traditional computer vision algorithm opencv were used. The software developed by pycharm and python programming language was used to compile automatically a software to identify whether the required items were filled out. And on the basis of completing the software, it is connected to the embedded device high-speed clapper. It is applied to Fuzhou Customs to help the customs staff review the health form and declaration card of inbound and outbound passengers, which not only saves the time of staff and passengers, but also contributes to the prevention and control of epidemic situation to a certain extent.
APA, Harvard, Vancouver, ISO, and other styles
41

Ab Rahman, Ahmad Faiz, Hazlina Selamat, Ahmad Jais Alimin, Mohd Taufiq Muslim, Muhammad Mazizan Msduki, and Nurulaqilla Khamis. "Automotive Real-Time Data Acquisition Using Wi-Fi Connected Embedded System." ELEKTRIKA- Journal of Electrical Engineering 18, no. 3-2 (December 24, 2019): 7–12. http://dx.doi.org/10.11113/elektrika.v18n3-2.189.

Full text
Abstract:
The advancement in embedded systems, which includes the mass deployment of internet-connected electronics, allows the concept of Internet of Things (IoT), to become a reality. This paper discusses one example of how an internet-connected embedded system is utilized in an automotive system. An Electronic Control Unit (ECU), which functions as a control unit in a fuel injection system, are equipped with Wi-Fi capability and installed on 110cc motorcycle. The ECU is connected to multiple sensors that is used by the ECU as part of control system, as well as giving raw data in real time to the server by using Wi-Fi as the communication medium. The server will accumulate data transmitted from ECU by using MQTT protocol, chosen due to its minimal data profile. The data can be visualized through web portal, or opened by any other web-enabled devices. The data collected may also be used later for any other purposes, such as On-Board Diagnostics (OBD) system, etc.
APA, Harvard, Vancouver, ISO, and other styles
42

Qashlim, Akhmad, Basri Basri, Haeruddin Haeruddin, Ardan Ardan, Inggrid Nurtanio, and Amil Ahmad Ilham. "Smartphone Technology Applications for Milkfish Image Segmentation Using OpenCV Library." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 08 (May 20, 2020): 150. http://dx.doi.org/10.3991/ijim.v14i08.12423.

Full text
Abstract:
This research presents the use of smartphone technology to assist fisheries work. Specifically, we designed an Android application that utilizes a camera connected to the internet to detect RGB image objects and then convert them to HSV and gray scale. In this paper, Android-based smartphone technology using image processing methods will be discussed, a digital tool that provides fish detection results in the form of length, width, and weight used to determine the price of fish. This application was created using features provided by the OpenCV library to produce binary images. Three main challenges highlighted during application design including C ++ QT were used to build the user interface, the contour-active method was used to divide and separate image objects from the back-ground, while the clever edge edge method was used to improve the outline ap-pearance of objects. Both methods are implemented on the Android platform and utilize smartphone cameras as an identification tool. This application makes it possible to provide many benefits and great benefits for farm farmers but on the other hand will create technological gaps
APA, Harvard, Vancouver, ISO, and other styles
43

Nurhayati, Anjar Purba Asmara, and Feizia Huslina. "Maintaining Favourable Fermentation Conditions in Sargassum Liquid Fertilizer Production using Siphon in A Two-Containers System Resulting in Acceptable Levels of Heavy Metals." Journal of Physics: Conference Series 2243, no. 1 (June 1, 2022): 012069. http://dx.doi.org/10.1088/1742-6596/2243/1/012069.

Full text
Abstract:
Abstract A U-shapedsiphon was used to connect two 600 mL disposed of mineral water-plastic bottles called container A and B. Container A served as a decomposer drum for mixingSargassum porridge, EM4 (effective microorganisms 4), organic nutrients, and water to allow an anaerobic fermentation to occur within 25 days.B was an aeration drum containing an acceptable volume of freshwater. Between these two containers, the siphon was set to bridge the air between containers above the suspension. There were 14 different configurations including a siphon with three different diameters (0.5, 1, 1.5 cm), four different lengths (16, 18, 20, 22 cm), and three different connections (connected to aeration drum, opened to air, closed). The last two configurations did not need the siphon. During the fermentation process, gas and heat were perceptibly released inone way-flowing from A to B and creating bubblesin Bleading to a maintained condition of the fermentation. As the one of main challenging aspects in the production of sargassum liquid fertilizer (SFL) is the considerable number of heavy metals, therefore, we measured some transition metals levels extracted in the filtrate post-25 days to estimate the safety level of the product compared to those mentioned in the Regulation of the Indonesian Ministry of Agriculture (Permentan70/SR/140/10/2011). All data excluding sample S4 were below the limit, except Cd level, whereby two configurations gave the least values of potentially toxic elements, which might be linked to the role of the siphon in giving a favourable condition for preventing the release of the heavy metals trapped in the cell walls.
APA, Harvard, Vancouver, ISO, and other styles
44

Khliefat, Ibrahim, Mohammed Naser, Fadi Alhomaidat, and Shadi Hanandeh. "Improving the Capacity and Level of Service at the Sixth Circle in Jordan by Using Traffic Signals and Roundabout Metering Approach." Open Transportation Journal 15, no. 1 (May 21, 2021): 69–80. http://dx.doi.org/10.2174/1874447802115010069.

Full text
Abstract:
Background and Objective: This study aims to improve the capacity and level of service at the sixth circle in Jordan by using traffic signals and a roundabout metering approach. Methods: VISSIM software and C++ program were used to improve the capacity and level of service. The site area (Sixth circle) was located near Crown Plaza and the Jordan Gate Towers project, which causes congestion due to heavy traffic flow. Therefore, this paper assesses the traffic in the sixth circle and presents the possible solutions to reduce the daily traffic flow for the users of this circle. Results: Four signals were placed at the roundabout in the second scenario, which was connected to each other with different cycle lengths. 90-second cycle length gives D value of the level of service. The third scenario was placed adaptive signals on the roundabout, which connects traffic signals with ground detectors placed at a certain distance before the signal and based on the queue length of the flow cars that pass the detector. Conclusion: The adaptive signals worked on the opening and closing and were designed according to the language simulation and the adoption of the language C++. The first two signals were opened considering the Swefieh road with the reference of King Faisal for a period of 45 seconds. It was then closed for 45 seconds to open the signal from the next street from the fifth circle with Zahran street.
APA, Harvard, Vancouver, ISO, and other styles
45

Hoffmann, Peter, and Roland Dierken. "Advanced Laser Joining by Use of Process Optimizing System Technology." Materials Science Forum 580-582 (June 2008): 527–30. http://dx.doi.org/10.4028/www.scientific.net/msf.580-582.527.

Full text
Abstract:
Due to manifold variants of joining processes feasible by laser, new possibilities have opened up in product design. An economic application of laser technology is usually connected to a laser adapted modification of the part design and a laser system technology, which meets the requirements of the chosen process in an optimum manner. For this contribution, three applications have been chosen in order to demonstrate the versatility of the laser joining technology.
APA, Harvard, Vancouver, ISO, and other styles
46

Chiu, Kit Fung Henry. "Going to the people: Community screening, documentary and the plebeian public sphere in Hong Kong." Asian Cinema 33, no. 2 (October 1, 2022): 209–24. http://dx.doi.org/10.1386/ac_00056_1.

Full text
Abstract:
This article is an ethnographic and historical study that focuses on the ‘plebeian public sphere’ – a democratic sphere opened up by the community screening of independent documentary films. My article argues that this innovative public screening establishes a mode of communication that connects audiences with the neighbourhood where people gather together and form local communities by sharing experience and emotion based on history, story and memory. This process evokes a source of affective energy that is capable of catalysing social change. It challenges not only previous theoretical approaches to the public sphere, but also the stereotypical understanding of ‘the public’ in the Hong Kong context.
APA, Harvard, Vancouver, ISO, and other styles
47

Ziober, Aleksandra. "The political attitudes of Krzysztof and Janusz Radziwill towards the election of Wladyslaw IV and Jan Kazimierz. Outline of the problem." Open Political Science 1, no. 1 (December 31, 2018): 193–203. http://dx.doi.org/10.1515/openps-2018-0017.

Full text
Abstract:
AbstractThe attitudes of the elite of the Grand Duchy of Lithuania and especially of representatives of Radziwill family (Krzysztof and Janusz) towards the election of the last two Vasas are an interesting problem for deliberations and research, especially taking into account differences in the country’s internal and foreign situation in 1632 and 1648, which determined the activities of mentioned above. This article was mainly intended to discuss the problem connected with the attitudes of the Lithuanian nobility towards the election of a new king and also indicating the role of connections of Wladyslaw IV and Jan Kazimierz with the Jagiellonians in political games. Answering the question of what and how influenced the attitudes and moods among the nobility, their argumentation to support one or other candidate requires many years of research and use of methods developed by other humanities, such as sociology, social psychology or political science.
APA, Harvard, Vancouver, ISO, and other styles
48

Velineni, Poornesh, Jayasuriya Suresh, Naveen Kumar C, and Suresh M. "Design of Pneumatic Gripper for Pick and Place Operation (Four Jaw)." International Research Journal of Multidisciplinary Technovation 2, no. 2 (March 30, 2020): 1–8. http://dx.doi.org/10.34256/irjmt2021.

Full text
Abstract:
Grippers are attached at the end of an industrial arm robot for material handling purpose. Grippers plays a major role in all pick and place application industries. Those are connected as end effectors to realize and develop a task in an industrial work floor. Pneumatic gripper works with the principle of compressed air. The gripper is connected to a compressed air supply. When air pressure is applied on the piston, the gripper gets opened while the air gets exist from the piston it gets closed. It is possible to control the force acting on the gripper by controlling the air pressure with the help of the valve. The objective is to design an effective, simple, and economic gripper for pick and place application.
APA, Harvard, Vancouver, ISO, and other styles
49

Damle, Abhinav, Bhumika Gireesh, Chirag T G, Siddhant S. Iyyanna, and Mr Santhosh B. "Two Way Authentication System for Exam Paper Leakage Detection: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 943–47. http://dx.doi.org/10.22214/ijraset.2022.40690.

Full text
Abstract:
Abstract: The idea behind this project is to guard the leak of question papers before the examination and conjointly to maintain the protection of the solution paper till they reach the centre for analysis. An Electronic management Box is made during which the communication papers are going to be placed, and may be opened solely at the precise time of examination once the cross checking of the time. If anyone attempts to open the box before the stipulated time, then a beep sound can come from the buzzer, that is connected to the electronic box. RFID is connected to the electronic management box, that acts as a primary level of authentication. Keywords: RFID, Exam paper, Electronic Control box, GSM module, buzzer
APA, Harvard, Vancouver, ISO, and other styles
50

Decreton, Benoit, Felipe Monteiro, Jean-Marc Frangos, and Lisa Friedman. "Innovation Outposts in Entrepreneurial Ecosystems: How to Make Them More Successful." California Management Review 63, no. 3 (March 5, 2021): 94–117. http://dx.doi.org/10.1177/0008125621996494.

Full text
Abstract:
Startups in entrepreneurial ecosystems such as Silicon Valley constantly generate potentially disruptive technologies and business models. Consequently, multinational companies are finding it essential to be connected to the ecosystems where these opportunities are emerging, and many have opened “innovation outposts” in these locations. However, not many outposts succeed in effectively connecting their companies with these ecosystems. This article details why outposts often fail to become “effective brokers” and what companies should do for their outposts to deliver their full potential.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography