-
Internet of Things(IoT) Based Multilevel Drunken Driving Detection and Prevention System Using Raspberry Pi 3
Authors:
Viswanatha V,
Venkata Siva Reddy R,
Ashwini Kumari P,
Pradeep Kumar S
Abstract:
In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of dri…
▽ More
In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of driver, facial recognition using webcam & MATLAB and a Wi-Fi module to send a message through the TCP/IP App, a Raspberry pi module to turn off the ignition and an alarm as prevention module. If a driver alcohol intake is more than the prescribed range, set by government the ignition will be made off provided either his heart beat abnormal or the driver is drowsy. In both the cases there will be a message sent to the App and from the App you can send it to family, friend, and well-wisher or nearest cop for the help. The system is developed considering the fact if driver is drunk and he needs a help, his friend can drive the car if he is not drunk. The safety of both the driver and the surroundings are aimed by this system and this aids in minimizing death cases by drunken driving and also burden on the cops.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
3D printed cable-driven continuum robots with generally routed cables: modeling and experiments
Authors:
Soumya Kanti Mahapatra,
Ashwin K. P.,
Ashitava Ghosal
Abstract:
Continuum robots are becoming increasingly popular for applications which require the robots to deform and change shape, while also being compliant. A cable-driven continuum robot is one of the most commonly used type. Typical cable driven continuum robots consist of a flexible backbone with spacer disks attached to the backbone and cables passing through the holes in the spacer disks from the fix…
▽ More
Continuum robots are becoming increasingly popular for applications which require the robots to deform and change shape, while also being compliant. A cable-driven continuum robot is one of the most commonly used type. Typical cable driven continuum robots consist of a flexible backbone with spacer disks attached to the backbone and cables passing through the holes in the spacer disks from the fixed base to a free end. In most such robots, the routing of the cables are straight or a smooth helical curve. In this paper, we analyze the experimental and theoretical deformations of a 3D printed continuum robot, for 6 different kinds of cable routings. The results are compared for discrete optimization based kinematic modelling as well as static modelling using Cosserat rod theory. It is shown that the experimental results match the theoretical results with an error margin of 2%. It is also shown that the optimization based approach is faster than the one based on Cosserat rod theory. We also present a three-fingered gripper prototype where each of the fingers are 3D printed continuum robots with general cable routing. It is demonstrated that the prototype can be used for gripping objects and for its manipulation.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
High-Speed Signature Matching in Network Interface Device using Bloom Filters
Authors:
Arun Kumar S P
Abstract:
Network intrusion detection systems play a critical role in protecting the information infrastructure of an organization. Due to the sophistication and complexity of techniques used for the analysis they are commonly based on general-purpose workstations. Although cost-efficient, these general-purpose systems are found to be inadequate as they are unable to perform efficiently at high packet rat…
▽ More
Network intrusion detection systems play a critical role in protecting the information infrastructure of an organization. Due to the sophistication and complexity of techniques used for the analysis they are commonly based on general-purpose workstations. Although cost-efficient, these general-purpose systems are found to be inadequate as they are unable to perform efficiently at high packet rates. The resulting packet loss degrades the system's overall effectiveness, as the analyzing capability of the system is reduced. It has been found that the performance of these sensors can be improved significantly by filtering out unwanted packets. This paper presents the design of a Programmable Ethernet Interface Card that is used to offload signature matching from software and thereby improve the detection ratio and performance of the system.
△ Less
Submitted 3 January, 2010; v1 submitted 29 December, 2009;
originally announced December 2009.
-
Link Enhancer for Vehicular Wireless ATM Communications
Authors:
Arun Kumar S P,
Diganta Baishya,
Amrendra Kumar
Abstract:
Majority of the applications used in defense are voice, video and data oriented and has strict QoS requirements. One of the technologies that enabled this is Asynchronous Transfer Mode (ATM) networking. Traditional ATM networks are wired networks. But Tactical networks are meant to be mobile and this necessitates the use of radio relays for Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle…
▽ More
Majority of the applications used in defense are voice, video and data oriented and has strict QoS requirements. One of the technologies that enabled this is Asynchronous Transfer Mode (ATM) networking. Traditional ATM networks are wired networks. But Tactical networks are meant to be mobile and this necessitates the use of radio relays for Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communications. ATM networks assume a physical link layer BER of 10^-9 or better because of the availability of reliable media like optical fiber links. But this assumption is no longer valid when ATM switches are connected through radio relay where error rates are in the rage of 10^-3. This paper presents the architecture of a Link Enhancer meant to improve the Bit Error Rate of the Wireless links used for V2I and V2V communications from 1 in 10^4 to 1 in 10^8
△ Less
Submitted 24 April, 2008;
originally announced April 2008.
-
Service Cloaking and Authentication at Data Link Layer
Authors:
Arun Kumar S P
Abstract:
This paper discusses that there is significant benefit in providing stronger security at lower layers of the network stack for hosts connected to a network. It claims to reduce the attack vulnerability of a networked host by providing security mechanisms in a programmable Network Interface Card (NIC). Dynamic access control mechanisms are implemented in hardware to restrict access to the service…
▽ More
This paper discusses that there is significant benefit in providing stronger security at lower layers of the network stack for hosts connected to a network. It claims to reduce the attack vulnerability of a networked host by providing security mechanisms in a programmable Network Interface Card (NIC). Dynamic access control mechanisms are implemented in hardware to restrict access to the services provided, only to authenticated hosts. This reduces server vulnerability to various layer 2 attacks. Also the services will be immune to zero-day vulnerabilities due to the minimal code execution paths. To this end, it presents architecture and implementation details of a programmable network interface card equipped with these measures. It works alongside, and augments, existing security protocols making deployment practical.
△ Less
Submitted 23 April, 2008;
originally announced April 2008.