Skip to main content

Showing 1–5 of 5 results for author: P., A K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2004.10174  [pdf

    eess.SY cs.CY

    Internet of Things(IoT) Based Multilevel Drunken Driving Detection and Prevention System Using Raspberry Pi 3

    Authors: Viswanatha V, Venkata Siva Reddy R, Ashwini Kumari P, Pradeep Kumar S

    Abstract: In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of dri… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

  2. arXiv:2003.04593  [pdf, other

    cs.RO

    3D printed cable-driven continuum robots with generally routed cables: modeling and experiments

    Authors: Soumya Kanti Mahapatra, Ashwin K. P., Ashitava Ghosal

    Abstract: Continuum robots are becoming increasingly popular for applications which require the robots to deform and change shape, while also being compliant. A cable-driven continuum robot is one of the most commonly used type. Typical cable driven continuum robots consist of a flexible backbone with spacer disks attached to the backbone and cables passing through the holes in the spacer disks from the fix… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 6 pages, 7 figures. Submitted to IEEE RA-L with IROS 2020 Option. Supplementary video at \<https://youtu.be/6dFoXKkQI3U>

  3. arXiv:0912.5292  [pdf

    cs.NI

    High-Speed Signature Matching in Network Interface Device using Bloom Filters

    Authors: Arun Kumar S P

    Abstract: Network intrusion detection systems play a critical role in protecting the information infrastructure of an organization. Due to the sophistication and complexity of techniques used for the analysis they are commonly based on general-purpose workstations. Although cost-efficient, these general-purpose systems are found to be inadequate as they are unable to perform efficiently at high packet rat… ▽ More

    Submitted 3 January, 2010; v1 submitted 29 December, 2009; originally announced December 2009.

    Comments: Pre-print version. International Joint Journal Conference in Engineering, IJJCE 2009

    ACM Class: C.2.0; C.2.5; D.4.6; K.4.4

    Journal ref: International Journal of Recent Trends in Engineering, Volume 1, Number 1, May 2009

  4. arXiv:0804.3814  [pdf

    cs.NI cs.PF

    Link Enhancer for Vehicular Wireless ATM Communications

    Authors: Arun Kumar S P, Diganta Baishya, Amrendra Kumar

    Abstract: Majority of the applications used in defense are voice, video and data oriented and has strict QoS requirements. One of the technologies that enabled this is Asynchronous Transfer Mode (ATM) networking. Traditional ATM networks are wired networks. But Tactical networks are meant to be mobile and this necessitates the use of radio relays for Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle… ▽ More

    Submitted 24 April, 2008; originally announced April 2008.

    ACM Class: C.2.1; C.2.5; E.4

  5. arXiv:0804.3796  [pdf

    cs.NI cs.CR

    Service Cloaking and Authentication at Data Link Layer

    Authors: Arun Kumar S P

    Abstract: This paper discusses that there is significant benefit in providing stronger security at lower layers of the network stack for hosts connected to a network. It claims to reduce the attack vulnerability of a networked host by providing security mechanisms in a programmable Network Interface Card (NIC). Dynamic access control mechanisms are implemented in hardware to restrict access to the service… ▽ More

    Submitted 23 April, 2008; originally announced April 2008.

    ACM Class: C.2.0; C.2.5; D.4.6; K.4.4