1,592 research outputs found

    Efficient Cell Phone Keypad Designing for Bangla SMS Using English Alphabets

    Get PDF
    Mobile phone networks are increasingly supporting the transmission of textual message between individuals. In this paper we have introduced a new approach that will enhance the speed of typing process in Bangla by using English mobile keypad. An example of making Bangla sentences using English keypad could be “Ami valo achiâ€. Traditional cell phone keypad is not suitable for Bangla typing using English alphabets and number of key pressing is high to make such Bangla SMS (Short Message Service). The proposed approach has been explored to speed up the typing process in Bangla using English alphabets. The alphabets are rearranged according to the priority of frequencies. The frequency of alphabet is appeared by most used letter in SMS. The letters which are mostly used are recognized as higher frequency. The proposed design consumes less time for typing Bangla SMS using English letter format. Keywords: Mobile keypad, unitap, multitap, Bangla SMS, frequency

    Improving Access to Voting: A Report on the Technology for Accessible Voting Systems

    Get PDF
    Twenty percent of U.S. adults with disabilities--more than 8 million eligible voters--say they have been unable to vote in presidential or congressional elections due to barriers at or getting to the polls. Improving Access to Voting is a new report by technology expert Noel Runyan, published by Demos and Voter Action, that finds that state voting systems are widely noncompliant with federal ADA and HAVA access requirements for voters with disabilities

    Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings

    Get PDF
    Alarm systems with keypads, sensors and sirens protect our homes and commercial premises from intruders. The reliability of these systems has improved over the past years but the technology has remained largely as it was 3 decades ago. With simple keypads and generally 4 digit PIN codes used for setting and unsetting the alarms, the main protection against a determined intruder is the necessity to choose robust PIN codes. However, with PIN codes chosen that are generally easy to remember and therefore relatively easy to guess, or numbers chosen to follow a pattern on the keypad, the main protection from these systems lies in the ability to detect an intruder as they approach the keypad. This gives the intruder very little time to try multiple codes meaning the systems are secure because the intruder is detected quickly. This research looks at the choices of PIN codes and the patterns that they often follow, and sets out the forthcoming research that will look at circumventing the safeguards by performing computer driven attacks against the codes when access to the device is possible and when remote access to the device can be made over the telephone system. Additionally, the forensic evidence left behind by an attacker is discussed and how simple enhancements to systems can have significant advantages in enhancing the amount of evidence that can be found. This paper describes the preliminary findings from analysing 700 alarm codes used in alarm systems throughout New Zealand and describes the planned research into alarm system security and forensic evidence remaining after a successful attack by an intruder

    Education for the Base of the Pyramid People (BOP) using Voice Internet e-Learning

    Get PDF
    AbstractThe need for education, especially for the Base of the Pyramid people (BOP) is very important from various aspects including their survivability, Economic, Social, Cultural and other developments, and minimizing the Digital Divide & Rich-Poor gap. Since many BOP are illiterate, live in rural areas where schools or educational institutions are scarce and cannot afford to go to schools, educating such population is a daunting task. In this paper, we describe a practical affordable solution to educate BOP using Voice Internet e-Learning that uses an Intelligent Agent and user's voice using any phone. Our approach uses both informal and formal learning including learning how to read or write using natural language. We emphasize on practical informal learning on Innovation and Entrepreneurship to ensure immediate and sustainable significant impact on Economic, Social and Cultural developments, along with creation of an enormous “Resource”

    Mobile phone interaction techniques for rural economy development - a review

    Get PDF
    Rural communities, especially in developing countries, are often neglected in terms of facilities and services that aid their social and economic development. This is evident even in software development processes, in that these groups of users or potential users’ are often not taken into consideration. The resultant effect is that they may not use it or use it sparingly. The objective of this study is to identify the various researches on interaction techniques and user interface design as a first step to the design of suitable mobile interactions and user interfaces for rural users. This research project is also aimed at socio-economic development and adding value to mobile phone users in Dwesa, a rural community in South Africa. This paper presents a literature survey of interaction techniques and user-interfaces. An analysis of the interaction techniques with respect to their suitability, availability of technologies, user capabilities for implementation in a rural context is discussed. Descriptive statistics of users’ current phones interaction facilities in the rural community which briefly illustrates users’ experiences and capabilities in different interaction modes is also presented.KEY WORDS: Interaction Techniques, Mobile phone, User Interface, ICT, Rural Development

    A robotic arm for safe and accurate control of biomedical equipment during COVID-19

    Get PDF
    Purpose Hospital facilities and social life, along with the global economy, have been severely challenged by COVID-19 since the World Health Organization (WHO) declared it a pandemic in March 2020. Since then, countless ordinary citizens, as well as healthcare workers, have contracted the virus by just coming into contact with infected surfaces. In order to minimise the risk of getting infected by contact with such surfaces, our study aims to design, prototype, and test a new device able to connect users, such as common citizens, doctors or paramedics, with either common-use interfaces (e.g., lift and snack machine keyboards, trafc light push-buttons) or medical-use interfaces (e.g., any medical equipment keypad) Method To this purpose, the device was designed with the help of Unifed Modelling Language (UML) schemes, and was informed by a risk analysis, that highlighted some of its essential requirements and specifcations. Consequently, the chosen constructive solution of the robotic system, i.e., a robotic-arm structure, was designed and manufactured using computeraided design and 3D printing. Result The fnal prototype included a properly programmed micro-controller, linked via Bluetooth to a multi-platform mobile phone app, which represents the user interface. The system was then successfully tested on diferent physical keypads and touch screens. Better performance of the system can be foreseen by introducing improvements in the industrial production phase. Conclusion This frst prototype paves the way for further research in this area, allowing for better management and preparedness of next pandemic emergencies. © 2023, The Author(s)

    Designing Usable and Secure Authentication Mechanisms for Public Spaces

    Get PDF
    Usable and secure authentication is a research field that approaches different challenges related to authentication, including security, from a human-computer interaction perspective. That is, work in this field tries to overcome security, memorability and performance problems that are related to the interaction with an authentication mechanism. More and more services that require authentication, like ticket vending machines or automated teller machines (ATMs), take place in a public setting, in which security threats are more inherent than in other settings. In this work, we approach the problem of usable and secure authentication for public spaces. The key result of the work reported here is a set of well-founded criteria for the systematic evaluation of authentication mechanisms. These criteria are justified by two different types of investigation, which are on the one hand prototypical examples of authentication mechanisms with improved usability and security, and on the other hand empirical studies of security-related behavior in public spaces. So this work can be structured in three steps: Firstly, we present five authentication mechanisms that were designed to overcome the main weaknesses of related work which we identified using a newly created categorization of authentication mechanisms for public spaces. The systems were evaluated in detail and showed encouraging results for future use. This and the negative sides and problems that we encountered with these systems helped us to gain diverse insights on the design and evaluation process of such systems in general. It showed that the development process of authentication mechanisms for public spaces needs to be improved to create better results. Along with this, it provided insights on why related work is difficult to compare to each other. Keeping this in mind, first criteria were identified that can fill these holes and improve design and evaluation of authentication mechanisms, with a focus on the public setting. Furthermore, a series of work was performed to gain insights on factors influencing the quality of authentication mechanisms and to define a catalog of criteria that can be used to support creating such systems. It includes a long-term study of different PIN-entry systems as well as two field studies and field interviews on real world ATM-use. With this, we could refine the previous criteria and define additional criteria, many of them related to human factors. For instance, we showed that social issues, like trust, can highly affect the security of an authentication mechanism. We used these results to define a catalog of seven criteria. Besides their definition, we provide information on how applying them influences the design, implementation and evaluation of a the development process, and more specifically, how adherence improves authentication in general. A comparison of two authentication mechanisms for public spaces shows that a system that fulfills the criteria outperforms a system with less compliance. We could also show that compliance not only improves the authentication mechanisms themselves, it also allows for detailed comparisons between different systems
    corecore