Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Mirthconnect Howto Document, Sebastien Pardon, Damon Berry
Mirthconnect Howto Document, Sebastien Pardon, Damon Berry
Reports
This document aims at describing the steps involved in installing and configuring Mirth Connect so as to produce an EN13606-compliant record extract from an HL7v2 message using the LinkedEHR- produced xquery.
Thermal Robotic Arm Controlled Spraying Via Robotic Arm And Vision System, Dermot Breen
Thermal Robotic Arm Controlled Spraying Via Robotic Arm And Vision System, Dermot Breen
Doctoral
The Tribology Surface Engineering industry is a worldwide multi billion euro industry with significant health and safety risks. The thermal spraying sector of this industry employs the technique of applying molten surface coating material to a substrate via a thermal spray process which is implemented either by manual spraying or pre-programmed robotic systems. The development of autonomous robotic systems for thermal spraying surface coating would significantly improve production and profitability over pre-programmed systems and improve health and safety over manual spraying. The aim of this research was to investigate and develop through software simulation, physical modelling and testing the development …
E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle
E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle
Conference papers
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …