Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Mirthconnect Howto Document, Sebastien Pardon, Damon Berry Sep 2010

Mirthconnect Howto Document, Sebastien Pardon, Damon Berry

Reports

This document aims at describing the steps involved in installing and configuring Mirth Connect so as to produce an EN13606-compliant record extract from an HL7v2 message using the LinkedEHR- produced xquery.


Thermal Robotic Arm Controlled Spraying Via Robotic Arm And Vision System, Dermot Breen Jan 2010

Thermal Robotic Arm Controlled Spraying Via Robotic Arm And Vision System, Dermot Breen

Doctoral

The Tribology Surface Engineering industry is a worldwide multi billion euro industry with significant health and safety risks. The thermal spraying sector of this industry employs the technique of applying molten surface coating material to a substrate via a thermal spray process which is implemented either by manual spraying or pre-programmed robotic systems. The development of autonomous robotic systems for thermal spraying surface coating would significantly improve production and profitability over pre-programmed systems and improve health and safety over manual spraying. The aim of this research was to investigate and develop through software simulation, physical modelling and testing the development …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …