Search results for: Bouraghda Skander
4 Arduino Robot Car Controlled via Android
Authors: Touil Issam, Bouraghda Skander
Abstract:
This paper elaborates on the comprehensive design, development, and evaluation of an Arduino-powered robot car operated through an Android-based application. The system is built upon an Arduino UNO microcontroller, leveraging Bluetooth technology to facilitate seamless communication between the robot and the Android control interface. The primary objective of the project is to provide users with an intuitive and interactive means to control autonomous systems while ensuring simplicity, cost-efficiency, and reliability. The architecture of the system encompasses hardware and software integration, where the microcontroller acts as the central processing unit, handling signals received via Bluetooth and translating them into precise motor commands. The Android application serves as a user-friendly interface, enabling real-time control of the robot's movement and functionality. This paper delves into the technical aspects of system architecture, including the hardware components, wiring schematics, and Bluetooth module integration. Additionally, it highlights the software development process, emphasizing the programming logic, algorithm design, and debugging techniques employed. Testing and validation phases are thoroughly documented, showcasing the system's performance under various conditions, including speed, maneuverability, and Bluetooth signal range. The results confirm the project's success in achieving its goals, offering a robust and accessible solution for educational and practical applications in robotics.Keywords: Arduino Robot, car, microcontroller, Bluetooth communication
Procedia PDF Downloads 03 An In-Depth Conceptual Framework for the Development of Prosthetic Hands: Emphasizing Transradial Prostheses
Authors: Touil Issam, Bouraghda Skander
Abstract:
The human hand is a vital yet intricate organ, essential for tasks ranging from grasping to executing fine motor skills. It serves as the most advanced and natural interface for interaction between humans and their surroundings. Upper-limb deficiencies, caused by conditions such as illness, accidents, or congenital factors, are prevalent worldwide. These deficiencies are categorized into seven types: partial hand, wrist disarticulation, transradial, elbow disarticulation, transhumeral, shoulder disarticulation, and forequarter, with transradial amputations being the most common and often well-suited for prosthetic hands. Advancements in technology and healthcare services have amplified the need for affordable, user-friendly, and functional prosthetic hands capable of restoring essential hand and finger functions. As a critical subset of medical robotics, prosthetic hands have seen notable design and development progress. However, challenges remain in achieving widespread user acceptance and satisfaction, highlighting the need for a holistic approach to their design and implementation. This study aims to consolidate the various factors involved in the development of prosthetic hands, focusing particularly on transradial prosthetics. It considers all types of prosthetic hands, whether actively powered, passively powered, or nonpowered. By presenting a comprehensive concept map, we aim to integrate these factors into a cohesive framework, guiding the development of prosthetic hands that offer enhanced functionality, improved user acceptance, and better alignment with user.Keywords: prosthetic hands, user-centeren design, human machine interaction design, assistive technologies, meical robotics
Procedia PDF Downloads 02 New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel
Abstract:
Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.Keywords: cloud, confidentiality, cryptography, security issues, trust issues
Procedia PDF Downloads 3781 Violence and Challenges in the Pamir Hindu Kush: A Study of the Impact of Change on a Central but Unknown Region
Authors: Skander Ben Mami
Abstract:
Despite its particular patterns and historical importance, the remote region of the Pamir Hindu Kush still lacks public recognition, as well as scientific substance, because of the abundance of classical state-centred geopolitical studies, the resilience of (inter)national narratives, and the political utility of the concepts of 'Central Asia' and 'South Asia'. However, this specific region of about 100 million inhabitants and located at the criss-cross of four geopolitical areas (Indian, Iranian, Chinese and Russian) over a territory of half a million square kilometres features a string of patterns that set it apart from the neighbouring areas of the Fergana, the Gansu and Punjab. Moreover, the Pamir Hindu Kush undergoes a series of parallel social and economic transformations that deserve scrutiny for their strong effect on the people’s lifestyle, particularly in three major urban centres (Aksu in China, Bukhara in Uzbekistan and Islamabad in Pakistan) and their immediate rural surroundings. While the involvement of various public and private stakeholders (States, NGOs, civil movements, private firms…) has undeniably resulted in positive elements (economic growth, connectivity, higher school attendance), it has in the same time generated a collection of negative effects (radicalizing, inequalities, pollution, territorial divide) that need to be addressed to strengthen regional and international security. This paper underscores the region’s strategical importance as the major hotbed and engine of insecurity and violence in Asia, notably in the context of Afghanistan’s enduring violence. It introduces the inner structures of the region, the different sources of violence as well as the governments’ responses to address it.Keywords: geography, security, terrorism, urbanisation
Procedia PDF Downloads 139