855 research outputs found

    Autonomous underground water detection Robot

    Get PDF
    India is one of the most water challenged countries in the world. Water demand is continuously increasing day by day, as people’s demand of water for different household and industrial purpose is increasing. Due to this, surface water is not able to meet the demands of water supply. Due to this need of underground water has increased. This work is focused to meet the challenge of finding out underground water in a simple way with the help of robot. This Arduino based robot would analyze the surface using Wenner method to find the presence of water body under the earth surface. Global Positioning System (GPS) attached to robot will send location of underground water to operator who is taking note of readings of water level. The data received during analysis will be fed through a program which will follow logic and store the amount of water present at that particular depth. This data will help to plot the map of where underground water is available in sufficient quantity

    Unmanned Secured Delivery System

    Get PDF
    Now a days customers are mostly prefer online shopping and ordering, that brought the need for the delivery man. The rapid increase in usage of online ordering has increased the requirement of manpower to deliver in multiple folds. Drone based technology is being used to meet this requirement. The present automated drone delivery system has a few drawbacks like- The drone just drops the ordered package to the location without the concern of whether the customer is available there or not. There is no facility to change the location after ordering the package. This work focuses on the unmanned secure delivery system which will address the above mentioned drawbacks. By interfacing GPS and GSM module to the drone, the intelligence of changing the location of delivery can be inherited by the user. Secondly, once the drone reaches the location if the users do not input their pass code in the drone via a keypad provided, the drone will not release the package. In this condition the drone will send an SMS to the user about the failure to deliver the package and will fly back to the vendor’s control station

    Security and Interoperable Medical Device Systems: Part 1

    Get PDF
    Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems\u27 security properties. Understanding the threats is an important first step in eventually designing security solutions for such systems. Part 1 of this two-part article provides an overview of the IMD environment and the attacks that can be mounted on it

    A Trust Model for Vehicular Network-Based Incident Reports

    Get PDF
    Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) networks are ephemeral, short-duration wireless networks that have the potential to improve the overall driving experience through the exchange of information between vehicles. V2V and V2I networks operate primarily by distributing real-time incident reports regarding potential traffic problems such as traffic jams, accidents, bad roads and so on to other vehicles in their vicinity over a multi-hop network. However, given the presence of malicious entities, blindly trusting such incident reports (even the one received through a cryptographically secure channel) can lead to undesirable consequences. In this paper, we propose an approach to determine the likelihood of the accuracy of V2V incident reports based on the trustworthiness of the report originator and those vehicles that forward it. The proposed approach takes advantage of existing road-side units (RSU) based V2I communication infrastructure deployed and managed by central traffic authorities, which can be used to collect vehicle behavior information in a crowd-sourcedfashion for constructing a more comprehensive view of vehicle trustworthiness. For validating our scheme, we implemented a V2V/V2I trust simulator by extending an existing V2V simulator with trust management capabilities. Preliminary analysis of the model shows promising results. By combining our trust modeling technique with a threshold-based decision strategy, we observed on average 85% accuracy

    Surgical Applications of Compliant Mechanisms:A Review

    Get PDF
    Current surgical devices are mostly rigid and are made of stiff materials, even though their predominant use is on soft and wet tissues. With the emergence of compliant mechanisms (CMs), surgical tools can be designed to be flexible and made using soft materials. CMs offer many advantages such as monolithic fabrication, high precision, no wear, no friction, and no need for lubrication. It is therefore beneficial to consolidate the developments in this field and point to challenges ahead. With this objective, in this article, we review the application of CMs to surgical interventions. The scope of the review covers five aspects that are important in the development of surgical devices: (i) conceptual design and synthesis, (ii) analysis, (iii) materials, (iv) maim facturing, and (v) actuation. Furthermore, the surgical applications of CMs are assessed by classification into five major groups, namely, (i) grasping and cutting, (ii) reachability and steerability, (iii) transmission, (iv) sensing, and (v) implants and deployable devices. The scope and prospects of surgical devices using CMs are also discussed

    A Monolithic Compliant Continuum Manipulator:A Proof-of-Concept Study

    Get PDF
    Continuum robots have the potential to form an effective interface between the patient and surgeon in minimally invasive procedures. Magnetic actuation has the potential for accurate catheter steering, reducing tissue trauma and decreasing radiation exposure. In this paper, a new design of a monolithic metallic compliant continuum manipulator is presented, with flexures for precise motion. Contactless actuation is achieved using time-varying magnetic fields generated by an array of electromagnetic coils. The motion of the manipulator under magnetic actuation for planar deflection is studied. The mean errors of the theoretical model compared to experiments over three designs are found to be 1.9 mm and 5.1degrees in estimating the in-plane position and orientation of the tip of the manipulator, respectively and 1.2 mm for the whole shape of the manipulator. Maneuverability of the manipulator is demonstrated by steering it along a path of known curvature and also through a gelatin phantom which is visualized in real time using ultrasound imaging, substantiating its application as a steerable surgical manipulator
    • …
    corecore