Blind people have many tasks to do in their lives. However, blindness generates challenges for them to perform their tasks. Many blind persons use a traditional stick to move around and to perform their tasks. But the obstacles are not detected in traditional stick, it is ineffective for visually impaired people. The blind person has no idea what kind of objects or obstacles are in front of him/her. The blind person has no idea what size the object is or how far away he or she is from it. It is difficult for a blind person to get around. To assist people with vision impairment by making many of their daily tasks simple, comfortable, and organized, they will be able to recognize anything (an obstacle for blind people). A smart stick with mobile application can be used. One of the solutions is a mobile-based Internet of Things solution, which is a stick intended to assist visually impaired people to navigate more easily. It enables blindness and low vision people to navigate and carry out their daily tasks with ease and comfort. A technologically advanced blind stick that enables visually impaired people to move with ease. This paper proposes a system of software and hardware that helps visually impairment people to find their ways in an easy and comfortable way. The proposed system uses smart stick and mobile application to help blind and visually impaired people to identify objects (such as walls, tables, vehicles, people, etc.) in their ways, this can enable them to avoid these objects. In addition, as a result, the system will notify the user through sound from the smartphone. Finally, if he/she gets lost, he will be able to send an SMS with his/her GPS location.
Modern learning techniques require technologies to be embedded within the process. The assessment strategy of testing students has been developed through the past few decades and have presented online computer-based examination systems as a replacement for the conventional paper-based testing. However, a major challenge that is still faced by those examination systems is that there is no any guarantee that students sitting adjacently will have different questions or forms, and the questions of exams’ form are not duplicated for any adjacent students within a lab. In fact, this can influence the reliability pertaining to the online examination systems. Consequently, a new algorithm is proposed in this paper for an online examination system that is capable of effectively generating several exam forms with minimal similarity for the constitutional questions, and that guarantees that two adjacent student’s terminals will not have the same forms. Further, the paper provides an explanation for the proposed algorithm and provides a real-life case for the implementation pertaining to the produced algorithm in a conducted experiment. It is found to be proven from the obtained results that the implementation, which is related to the produced form generation algorithm within this research reveals an evidence that is in line with the research assumptions in which an online system’s assessment reliability can be improved based on eliminating adjacent locations of a form similarity.
With the current continuous increase in the usage of communication technologies and data transmission amount, the available web services and mobile applications are used to access and complete several online activities such as online education, e-commerce, and online financial transactions. The needs for a strong and secure access control authentication solution for users' data and the available online resources are crucial. Authentication can play a major role in protection by implementing a solution, which allows users to prove their identities and provide access permission to all legitimate users only. This paper proposes two-factor authentication scheme based on the usage of a modified copy of the Schnorr Signcryption algorithm. The proposed scheme achieves the target goal of this paper, which provides the users with an efficient solution that can be implemented in any authentication solution as the second factor, with no special requirement and can be used to authenticate the users and control recourses access permission. Moreover, a Java-based application is developed to examine the proposed scheme in a client-server architecture where it is found that the solution can successfully authenticate authorized users and reject any unauthorized access request with an adequate security protection level and acceptable performance.Povzetek: V članku je predlagana rešitev z dvofaktorsko avtentikacijo na osnovi modificiranega algoritma Schnorr Signcryption, ki omogoča učinkovito avtentikacijo uporabnikov in nadzor dostopa do virov. Rezultati preizkusa kažejo zadostno varnost in sprejemljivo zmogljivost.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.