scispace - formally typeset
Search or ask a question

Showing papers on "Laptop published in 2021"


Journal ArticleDOI
TL;DR: It is found that modern web platforms provide reasonable accuracy and precision for display duration and manual response time, and that no single platform stands out as the best in all features and conditions.
Abstract: Due to increasing ease of use and ability to quickly collect large samples, online behavioural research is currently booming. With this popularity, it is important that researchers are aware of who online participants are, and what devices and software they use to access experiments. While it is somewhat obvious that these factors can impact data quality, the magnitude of the problem remains unclear. To understand how these characteristics impact experiment presentation and data quality, we performed a battery of automated tests on a number of realistic set-ups. We investigated how different web-building platforms (Gorilla v.20190828, jsPsych v6.0.5, Lab.js v19.1.0, and psychoJS/PsychoPy3 v3.1.5), browsers (Chrome, Edge, Firefox, and Safari), and operating systems (macOS and Windows 10) impact display time across 30 different frame durations for each software combination. We then employed a robot actuator in realistic set-ups to measure response recording across the aforementioned platforms, and between different keyboard types (desktop and integrated laptop). Finally, we analysed data from over 200,000 participants on their demographics, technology, and software to provide context to our findings. We found that modern web platforms provide reasonable accuracy and precision for display duration and manual response time, and that no single platform stands out as the best in all features and conditions. In addition, our online participant analysis shows what equipment they are likely to use.

107 citations


Journal ArticleDOI
TL;DR: The effects of user decisions on the duration of product life is discussed based on two surveys carried out in a university student environment in southwest Germany based on the aspects of user knowledge, use and repair intensity, the motivation for and the mode of disposal.

12 citations


Journal ArticleDOI
TL;DR: In this paper, a wireless power transfer (WPT) system for tether-free electric power for cellphones, laptops, appliances, and transportation systems is presented. But the authors do not consider the health effects and safety of radiofrequency electromagnetic radiation.
Abstract: Wireless power transfer (WPT) systems are developed to provide electric power either directly or via battery charging. The optimism on WPT technology is driven by the ubiquity of cellphones, laptops, and mobile communication devices. Aside from not having to plug in a cellphone or laptop, WPT battery charging offers the potential for mobile devices to get electrical power the same way they get data through harvesting ambient electromagnetic radiation. The dream is a truly wireless mobility scenario with tether-free electric power for cellphones, laptops, appliances, and transportation systems. Beyond wireless communication, the electromagnetic power required for large-scale commercial WPT implementation is substantial. A key facet of the system design and research should include consideration of health effects and safety of radiofrequency electromagnetic radiation.

11 citations


Journal ArticleDOI
TL;DR: In this article, the impact of the coronavirus pandemic on the laptop lifespan was considered and the future quantities and pieces of obsolete laptops in Greece were estimated (2016-2040), as well as the critical raw materials (CRMs) and precious metals (PMs) embedded in them.

7 citations


Journal ArticleDOI
TL;DR: This work proposes the application of two probabilistic graphical Latent Dirichlet Allocation (LDA) and Probabilistic Latent Semantic Analysis (PLSA) algorithms to generate latent topic terms as possible aspects to improve the performance of the machine learning classification algorithm in ABSA.

6 citations


Proceedings ArticleDOI
09 Mar 2021
TL;DR: In this article, a Raspberry pi camera is used to capture images and Raspberry pi 3 model B to calculate the number of people entering and exiting a room and send the detected people going in and out of room to the web server.
Abstract: In present days, people detecting and counting is an important aspect in the video investigation and subjective demand in computer vision systems. For many applications, it is necessary to identify people and then accurately count the number of people in real time or near real time. To perform people counting, a robust system for people detection is needed. The system is designed to be able to calculate the number of people entering and exiting a room. The system is implemented using a raspberry pi camera to capture images, laptop to train a model for specific dataset, and raspberry pi 3 model B to apply the model, count detected person and send the number of people going in and out of room to the web server. Information from people counting support the retail shops to analyze customer visit patterns. In addition, it can also give useful information in the implementation of internet of things for smart rooms or smart buildings such as automation of room lights.

5 citations


Proceedings ArticleDOI
03 Mar 2021
TL;DR: Labtainers as mentioned in this paper is a Linux-based environment for computer science lab exercises with an initial emphasis on cybersecurity, which leverages Docker containers to instantiate one or more networked computers within a single VM.
Abstract: Labtainers are fully provisioned Linux-based computer science lab exercises with an initial emphasis on cybersecurity. Consistent lab execution environments and automated provisioning are provided by Docker containers. With over 50 lab exercises including multi-component networks that all run on a modestly performing laptop computer., Labtainers supports exploratory learning for both local and remote learners. They offer automated assessment of student lab activity and progress as well as individualized lab exercises to discourage sharing solutions. Free and open at: https://nps.edu/web/c3o/labtainers, Labtainers is distributed as a single virtual machine for either VirtualBox or VMWare. On an exercise-specific basis, the framework leverages Docker containers to instantiate one or more networked computers within that single VM. This hands-on workshop covers the basics of creating Labtainer-based labs, whether for security, networking, operating systems, or other computer science classes. The workshop also introduces how this lab framework helps remove three barriers to CS lab exercises: 1) administrative setup and resulting divergent behavior between student environments; 2) sharing of solutions amongst students; 3) assessing student work. Participants should have a computer running either VMWare or VirtualBox, with the Labtainers VM appliance installed.

4 citations


Journal ArticleDOI
14 Jun 2021
TL;DR: In this paper, a survey of 120 laptop users was conducted to assess the important factors and major media of advertisements influencing the purchase decision of a particular laptop brand using descriptive statics, and found that people are less price sensitive, people hardly switch from one brand of laptop to another because of price.
Abstract: Purpose: Consumer perception of laptop users is a great concern for market analysts, user and sellers. The aim is to assess the important factors and major media of advertisements influencing the purchase decision of a particular laptop brand using descriptive statics. Design/Methodology/Approach: The study is based on scheduled survey of 120 laptop users. Cross tabulation, percentage, and Likert scale were used to describe the perception quantitatively. Findings/Result: The study also showed that people are less price sensitive, people hardly switch from one brand of laptop to another because of price. In case of unavailability of their most preferred brand of laptop, most of them wait for their preferred brand, and only few buys second preferred brand or any available brand. Only higher price doesn’t mean good quality to most of the costumers and they are also not comfortable in using the recent, not proven technology. Customers are also influenced by sales schemes and offer while purchasing laptop. Focuses on 15-45 years user group should be targeted. Originality/Value: It is survey research significant for laptop buyers and sellers of Nepal using the descriptive model. Paper Type: Descriptive survey research

4 citations



Journal ArticleDOI
24 May 2021-PLOS ONE
TL;DR: In this paper, the authors used tracking software to monitor both class-related and off-task laptop use by undergraduate students enrolled in an introductory psychology course, and observed how types of laptop use related to course performance.
Abstract: Students often bring laptops to university classes, however, they do not limit their laptop use to class-related activity. Off-task laptop use occurs frequently in university classrooms and this use negatively impacts learning. The present study addresses whether potential benefits of class-related laptop use might mitigate the costs of off-task laptop activity. We used tracking software to monitor both class-related and off-task laptop use by undergraduate students enrolled in an introductory psychology course, and we observed how types of laptop use related to course performance. We found a positive correlation between class-related use and exam scores that was driven by viewing lecture slides during class. We also found a negative correlation between off-task laptop use and exam scores, but class-related activities did not predict an increase in off-task use. Thus, for students who constrain their laptop use to class-related activity, the benefits outweigh the costs. While a laptop may be beneficial for some, it is unclear which students are able to constrain themselves to class-related activities and whether the benefits of class-related laptop use obtained by slide viewing could be achieved by other means. Thus, students and educators should carefully consider the costs and benefits of laptop use in the classroom.

4 citations


Posted ContentDOI
08 Apr 2021
TL;DR: The research aims to develop an AR guided assembly application to provide instruction on the assembly of a laptop with an assembly complexity of 6.63 and with the developed application, the performance of the laptop assembly can be accelerated.
Abstract: Augmented Reality (AR) in the assembly process will improve the user's experience by providing interactive instructions in real time. However, no previous application of AR guided assembly for laptops with a high level of assembly complexity has been developed. The research aims to develop an AR guided assembly application to provide instruction on the assembly of a laptop. The assembly complexity of the laptop was also investigated. The development of the AR application involves the creation of model target, 3D models and animations, and the development of user interface. The laptop assembly consists of ten steps. Each step comprises animated 3D models and text detailing the assembly instructions. Speech recognition has been used to navigate the assembly sequence. The AR application has successfully been developed for laptop assembly with an assembly complexity of 6.63. With the developed application, the performance of the laptop assembly can be accelerated.

Posted Content
TL;DR: In this paper, a wide range of matrix models were considered using the Monte Carlo technique in the large $N$ limit and the results agreed with exact analytic expressions and recent numerical bootstrap methods for models with one and two matrices.
Abstract: We consider a wide range of matrix models and study them using the Monte Carlo technique in the large $N$ limit. The results we obtain agree with exact analytic expressions and recent numerical bootstrap methods for models with one and two matrices. We then present new results for several unsolved multi-matrix models where no other tool is yet available. In order to encourage an exchange of ideas between different numerical approaches to matrix models, we provide programs in Python that can be easily modified to study potentials other than the ones discussed. These programs were tested on a laptop and took between a few minutes to several hours to finish depending on the model, $N$, and the required precision.


Journal ArticleDOI
TL;DR: SPK that has been made will be able to provide recommendations best alternative choices and best suit the needs of buyers for selecting laptop products.
Abstract: Laptop is a desktop personal computer (PC) whose dimensions are reduced to increase flexibility in its use. However, the large number of products will make it difficult for consumers to choose a laptop that suits the needs of consumers who want to buy it. The purpose of this research is to help buyers who want to buy laptop products according to their needs by making a Decision Support System (DSS). There are 12 criteria considered in this research, price, processor, RAM capacity, hard disk capacity, SSD capacity, V-RAM capacity, maximum RAM upgrade capacity, laptop weight, screen size, screen type, screen refresh rate, and screen resolution. Choosing a laptop product there is a criterion value of a laptop product and a value of preference criteria from the buyer as a decision maker. Also the criteria values on laptop products have different contributions to the overall value of the laptop product. Thus, the methods used are Analytical Hierarchy Process (AHP), Profile Matching (PM) with linear interpolation, and Simple Addictive Weighting (SAW) to determine the recommended options. Lastly, SPK that has been made will be able to provide recommendations best alternative choices and best suit the needs of buyers for selecting laptop products.

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, the authors have studied the ergonomic interventions carried out to reduce pain and to improve the posture while working on desktop, laptops and smartphones, and the evaluation methods to assess the computer workstations are also laid out.
Abstract: The use of computers has been rapidly rising over the recent decade. In the recent past along with the usage of desktops, laptops and smartphones are widely used in most of the offices. With the advancement in technology in smartphones, people spend a lot of time using a smartphone for the basic need of networking. It was noticed that laptops and smartphones users tend to attain incorrect postures when compared with desktop users. It is the prime concern for the organizations to improve their work environment in order to optimize the health, safety, comfort and effectiveness of their employees. This paper is aimed to study the ergonomic interventions carried out to reduce pain and to improve the posture while working on desktop, laptops and smartphones. The ergonomic evaluation methods to assess the computer workstations are also laid out. This review will be helpful for the users to adjust their workstation correctly and designers to design the workstation to include better usability feature as per ergonomic guidelines during laptop, smartphone and desktop usage.

Posted Content
TL;DR: In this paper, the authors conducted an online pilot study among students and employees of University of Nigeria, Nsukka and a total of 145 responses were received and used for the study, which sought to find out the effect of age and level of education on the cyber hygiene knowledge and behaviour of respondents, and in addition, the type of devices used and activities they engage in while on the internet.
Abstract: As internet related challenges increase such as cyber-attacks, the need for safe practises among users to maintain computer system's health and online security have become imperative, and this is known as cyber-hygiene. Poor cyber-hygiene among internet users is a very critical issue undermining the general acceptance and adoption of internet technology. It has become a global issue and concern in this digital era when virtually all business transactions, learning, communication and many other activities are performed online. Virus attack, poor authentication technique, improper file backups and the use of different social engineering approaches by cyber-attackers to deceive internet users into divulging their confidential information with the intention to attack them have serious negative implications on the industries and organisations, including educational institutions. Moreover, risks associated with these ugly phenomena are likely to be more in developing countries such as Nigeria. Thus, authors of this paper undertook an online pilot study among students and employees of University of Nigeria, Nsukka and a total of 145 responses were received and used for the study. The survey seeks to find out the effect of age and level of education on the cyber hygiene knowledge and behaviour of the respondents, and in addition, the type of devices used and activities they engage in while on the internet. Our findings show wide adoption of internet in institution of higher learning, whereas, significant number of the internet users do not have good cyber hygiene knowledge and behaviour. Hence, our findings can instigate an organised training for students and employees of higher institutions in Nigeria.

01 Feb 2021
TL;DR: In this paper, the characteristics, objectives, benefits, advantages, and limitations of mobile learning in primary education were identified and analyzed during the pandemic of the year 2019, and a qualitative library research with descriptive-analytic analysis was conducted.
Abstract: This research aims to identify the characteristics, objectives, benefits, advantages and limitations of mobile learning, to analyze the opportunities and challenges of mobile learning utilization during the covid-19 pandemic, and to describe the application of mobile learning in primary education. This is a qualitative library research with descriptive-analytic analysis. The finding of study show that mobile learning as a part of e-learning has many advantages to support learning process without time, space and place limitation. Although has some limitations, mobile learning briefly has good opportunities to be utilized as virtual media during covid-19 pandemic to replace the face-to-face learning. Tablet, smartphone and laptop can be used as personal digital assistant devices to support mobile learning implementation. To perform it optimally, it takes teachers’ skills to operate devices and to design digital-based teaching materials properly . Keywords : e-learning, mobile learning, learning resources , pandemic covid-19

11 Oct 2021
TL;DR: In this article, the authors proposed a locking assembly for various electronic devices like laptops and tablets, which includes a frame adapted to be coupled to a base of the one or more electronic devices.
Abstract: The physical security of electronic devices like laptops and tablets is vital as these devices carry confidential data which cannot be compromised. Data security can be provided through a number of innovative ways. The first line of defence is physical security. As far as physical security is concerned, there has been very little development till date [1][2] . This research is focusing on the physical security of data storage devices. To provide physical security to laptop devices, this work proposes a locking assembly for various electronic devices like laptops and tablets [3][4]. The assembly includes a frame adapted to be coupled to a base of the one or more electronic devices. This locking assembly ensures the safety of devices against any possible theft or unauthorized usage. The design of this locking assembly presents a cost effective, easily available, and simpler to assemble, easy to manufacture and durable solution to the theft problems. A detailed analysis of the proposed design has been conducted which provided an insight of efficiency and usability of the locking mechanism. The mass properties of the model have been computed after assigning the standard material (Aluminium) to various components. The mass of the locking assembly has been estimated as 0.863 Kg and the volume are 0.002 cubic meters.

Journal ArticleDOI
TL;DR: In this article, the authors examined the efficacy of the laptop-free zones in two large college courses with a total of 168 students, 60 of whom reported sitting in a laptop-zone and found that students who sat in the laptop free zone performed better on objective measures of learning on the day of learning new material, but this difference was not significant on a measure of retention.
Abstract: Laptop use within college courses has been a topic of debate for nearly two decades. Completely banning laptops from college classes may seem appealing given the potential drawbacks, but these policies may have unintended consequences. One seemingly successful intervention that can address these conflicting goals is the use of laptop zones and laptop-free zones which allows students who want to use their laptops to continue to do so, without hindering the performance of those who do not. We examine the efficacy of this intervention through the lens of the theory of self-regulated learning. We implemented laptop(-free) zones in two large college courses with a total of 168 students, 60 of whom reported sitting in a laptop-zone. Students sitting in the laptop-free zone performed better on objective measures of learning on the day of learning new material, but this difference was not significant five days later on a measure of retention. Further, there were no differences between these groups on self-rated performance at the point of retention. By examining open-ended responses regarding their motivation to sit in the laptop-free zone or the laptop-zone, we found students who sat in the laptop-free zone typically reported wanting to avoid distractions and enhance their memory of the material/class performance compared to those who sat in the laptop zone. Also, more individuals who sat in the laptop zone reported doing so to ensure completeness of their notes, to look up extra course-related material, and to complete non-course related tasks while listening to the lecture. Lastly, we pose a set of future directions aimed at learning more about the use of laptops in and outside of class, and how we can help students be successful using laptops for learning.

Journal ArticleDOI
22 Jun 2021
TL;DR: This research produces output that meets the objectives, which can assist users in choosing the laptop that best suits their needs and can facilitate users in the decision-making process so as to produce accurate, effective and efficient information.
Abstract: The rapid development of technology, especially in the digital field, has had a huge influence on the development of laptop features and specifications today. With the development of increasingly diverse features and specifications, it often makes users confused in choosing a laptop that suits user needs. Based on this, the authors are interested in creating a decision support system to assist users in choosing a laptop that fits the desired criteria using the Topsis method. The type of data used by the author is primary data obtained through interviews and direct observation of laptop users. The purpose of this study is to assist laptop users in choosing a laptop that suits their needs. There are 10 criteria obtained based on observations and interviews, namely price (C1), RAM (C2), Hard drive (C3), processor (C4), screen size (C5), VGA (C6), battery (C7), Laptop Weight (C8), and Warranty (C9). Secondary data were obtained through literature study and scientific writing related to laptop selection and the TOPSIS method. This research produces output that meets the objectives, which can assist users in choosing the laptop that best suits their needs and can facilitate users in the decision-making process so as to produce accurate, effective and efficient information.

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, a JavaScript implementation of WebRTC and WebSockets is used to generate a grid network of connected devices, where the workload is divided into connected devices and the output of each sub-problem is generated in parallel.
Abstract: In this era of abundance of computing devices like smartphones, tablets, and laptops, their computation power is yet to be utilized efficiently. To fully utilize their computation power, we have made use of a JavaScript implementation of WebRTC and WebSockets to generate a grid network of connected devices. One of the core features of this platform is its ease of use, where the users can tap into the power by just opening their Chrome browsers, be it on their laptop, computers, or mobile devices. The workload is divided into these connected devices, and the output of each sub-problem is generated in parallel. The core objective of this paper is to illustrate how this approach will significantly reduce the time required to calculate the nonce for a transaction in the crypto-mining process and demonstrate the results of this grid network by comparing the performance in a combination of multiple daily drivers like mobiles and laptops.


Journal ArticleDOI
30 Mar 2021
TL;DR: The consequences of the research study discovered that most of the students used laptops for study purposes like making assignments on Microsoft word and presentations on PowerPoint and the results of teachers questionnaires revealed thatmost of the teachers used laptop for the preparation of lecturers and for different academic activities.
Abstract: A survey-based research study has been directed to reveal the impacts of using laptops at the university level. For this research, BS Mathematics and BS Physics students, both morning and evening sessions of Universities in South Punjab, Pakistan, were taken as a population. The population consists of 240 students and 10 teachers of four Universities in South Punjab. The sample of 112 students and10 teachers was taken by the Random sampling technique. Questionnaires and interviews were used as a research tool. The consequences of the research study discovered that most of the students used laptops for study purposes like making assignments on Microsoft word and presentations on PowerPoint. The results of teachers questionnaires revealed that most of the teachers used laptops for the preparation of lecturers and for different academic activities.

Proceedings ArticleDOI
09 Apr 2021
TL;DR: In this paper, the power consumption and changes in temperature of the microprocessor, physical memory, and integrated graphics card when different benchmark software (Cinebench R23, Unigine Superposition 1.1), stress test, and video game (CS-GO) executing instructions individually and simultaneously with each other.
Abstract: The usage of laptops and cell phones has drastically increased recently, specifically because of the Covid-19 pandemic. The pandemic and resulting shut downs have necessitated online studies, work from home, online meetings, video conferencing etc. Availability of either a laptop or cell phone has become basic requirement for attending online classes or virtual meetings. Hence, the usage of entry-level laptops (for example Intel Core-i3) and mid-range laptops (for example AMD Ryzen 5) has recently gained popularity. This particular research study aims to determine the power consumption and changes in temperature of the microprocessor, physical memory, and integrated graphics card when different benchmark software (Cinebench R23, Unigine Superposition 1.1), stress test, and video game (CS-GO) executing instructions individually and simultaneously with each other. Three different types of system configurations (Intel Core-i3, AMD Ryzen 5 low power, and AMD Ryzen 5 High-performance) were used to determine the performance and benchmarking of the processor with different physical memory, and different integrated graphics processing units. These processors have been tested under multiple benchmark software, stress tests, and video games. Cinebench R23, Unigine Superposition, Counter-Strike: Global Offensive software/game were used to analyze the performance. Mainly, power consumption, temperature changes with the different load on the processor, physical memory, and load on integrated GPU were analyzed when application was running.


Journal Article
TL;DR: In this article, a new artificial intelligence based deep learning formulation Distributed Artificial Neural Network (DANN) for real applications, AC placement in a room, design of new car doors from existing 15 given car doors, with six orders of magnitute speed up in computational time and need an everyday use laptop, not necessiating high end super computer servers for real application design and analysis.
Abstract: In this paper, we provide a new artificial intelligence based deep learning formulation Distributed Artificial Neural Network (DANN) for real applications, AC placement in a room, design of new car doors from existing 15 given car doors, with six orders of magnitute speed up in computational time and need an everyday use laptop, not necessiating high end super computer servers for real application design and analysis. Further, the accuracy of the real application solution showed 99.9% accuracy and comparable to the conventional existing engineering applications software results.

Patent
28 Jan 2021
TL;DR: In this paper, a camera lens, a camera module, and an electronic device are used for photographing mounted in front of a vehicle in order to reduce the size and bottom width of the camera lens.
Abstract: Embodiments of the present application provide a camera lens, a camera module, and an electronic device The electronic device may comprise a mobile phone, a tablet computer, a laptop computer, an ultra-mobile personal computer (UMPC), a hand-held computer, a walkie-talkie, a netbook, a POS machine, a personal digital assistant (PDA), a wearable device, a virtual reality device, a wireless USB disk, a bluetooth speaker/headset, or a mobile or fixed terminal for photographing mounted in front of a vehicle By providing cut edges for the lens barrel and lenses, the size and bottom width of the camera lens are reduced, the space occupied by the camera lens in an electronic device is reduced, the area of the hole provided on the display screen is reduced, and the screen-to-body ratio of the display screen is increased

Journal ArticleDOI
TL;DR: In this paper, a novel ergonomic laptop desk for wheelchair users by considering their movement limitations was designed and evaluated in two phases in a laboratory and 14 wheelchair users were asked to complete a typing task within 20 minutes.
Abstract: BACKGROUND Nowadays, although using laptops to perform many routine activities is inevitable, many wheelchair users are not able to efficiently use their laptops due to their movement limitations and inappropriate workstations. OBJECTIVE The purpose of this study was to design and evaluate a novel ergonomic laptop desk for wheelchair users by considering their movement limitations. METHODS In this experimental study, we ergonomically designed and assessed a novel laptop desk in two phases in a laboratory. In the first phase of the study, design specifications were identified by an expert panel and, accordingly, a new laptop desk was designed and prototyped for the wheelchair users. In the second phase, in order to evaluate the laptop desk, 14 wheelchair users were asked to complete a typing task within 20 minutes, both with and without using the laptop desk. Postural risk level, perceived discomfort, and task performance were evaluated using the Rapid Upper Limb Assessment (RULA) technique, Local Perceived Discomfort (LPD) questionnaire, and the number of letters typed and typing errors, respectively. RESULTS The postures of the wrist, arm, and neck regions were corrected from RULA action level 3 to 2 when the designed laptop desk was used. In addition, the average perceived discomfort of the participants significantly decreased in the neck, shoulder, and wrist regions. Furthermore, typing accuracy was improved significantly when novel laptop desk was used. CONCLUSIONS Accommodating wheelchair user workstation by using the novel designed laptop desk could reduce musculoskeletal disorders risk factors and help wheelchair users to perform their work more efficiently.

Journal ArticleDOI
01 Apr 2021
TL;DR: This work uses RCF network to locate the screw hole contour, and makes improvements according to the characteristics of small screw hole size to solve the problem of positioning screw methods not suitable for black laptops.
Abstract: The recent application of computer vision to disassembly and remanufacturing has pushed forward this field significantly. In disassembling the laptop, we find that the existing positioning screw methods such as hough transform and template matching were not suitable for black laptops, so we propose a new method to solve this problem. We use RCF network to locate the screw hole contour, and make two improvements according to the characteristics of small screw hole size: 1. A feature integration module is added to RCF network to increase multi-scale features.2. A modulating factor is added to the loss function to enhance the attention to the indistinguishable pixels. Our approach has shown good results on black laptops and has higher ODS and OIS than the original RCF network and the existing method.

Proceedings ArticleDOI
02 Sep 2021
TL;DR: In this paper, the authors proposed an ensemble of AES and RSA cryptographic model which ensures that the file encryption key is distributed to a remote server and is only accessible via an android phone request from an authorized user.
Abstract: Laptops have become the workstation for a majority of people during the modern days. Many IT firms have migrated to laptops so that the employees have the necessary flexibility to work even from home due to unprecedented havocs like natural disasters and pandemics. Hence it is vital to safe guard the sensitive client related data present inside the laptop during theft. File system encryption is the widely adopted method to achieve the intended data security. But having the presence of decryption key within the stolen laptop is a loop hole for hardware experts to retrieve the sensitive contents. Hence our work proposes an ensemble of AES and RSA cryptographic model which ensures that the file encryption key is distributed to a remote server and is only accessible via an android phone request from an authorized user.