896 resultados para tablet devices
Resumo:
A parallel pipelined array of cells suitable for real-time computation of histograms is proposed. The cell architecture builds on previous work obtained via C-slow retiming techniques and can be clocked at 65 percent faster frequency than previous arrays. The new arrays can be exploited for higher throughput particularly when dual data rate sampling techniques are used to operate on single streams of data from image sensors. In this way, the new cell operates on a p-bit data bus which is more convenient for interfacing to camera sensors or to microprocessors in consumer digital cameras.
Resumo:
The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.
Resumo:
Energy storage is a potential alternative to conventional network reinforcementof the low voltage (LV) distribution network to ensure the grid’s infrastructure remainswithin its operating constraints. This paper presents a study on the control of such storagedevices, owned by distribution network operators. A deterministic model predictive control (MPC) controller and a stochastic receding horizon controller (SRHC) are presented, wherethe objective is to achieve the greatest peak reduction in demand, for a given storagedevice specification, taking into account the high level of uncertainty in the prediction of LV demand. The algorithms presented in this paper are compared to a standard set-pointcontroller and bench marked against a control algorithm with a perfect forecast. A specificcase study, using storage on the LV network, is presented, and the results of each algorithmare compared. A comprehensive analysis is then carried out simulating a large number of LV networks of varying numbers of households. The results show that the performance of each algorithm is dependent on the number of aggregated households. However, on a typical aggregation, the novel SRHC algorithm presented in this paper is shown to outperform each of the comparable storage control techniques.
Resumo:
The Distribution Network Operators (DNOs) role is becoming more difficult as electric vehicles and electric heating penetrate the network, increasing the demand. As a result it becomes harder for the distribution networks infrastructure to remain within its operating constraints. Energy storage is a potential alternative to conventional network reinforcement such as upgrading cables and transformers. The research presented here in this paper shows that due to the volatile nature of the LV network, the control approach used for energy storage has a significant impact on performance. This paper presents and compares control methodologies for energy storage where the objective is to get the greatest possible peak demand reduction across the day from a pre-specified storage device. The results presented show the benefits and detriments of specific types of control on a storage device connected to a single phase of an LV network, using aggregated demand profiles based on real smart meter data from individual homes. The research demonstrates an important relationship between how predictable an aggregation is and the best control methodology required to achieve the objective.
Resumo:
Reinforcing the Low Voltage (LV) distribution network will become essential to ensure it remains within its operating constraints as demand on the network increases. The deployment of energy storage in the distribution network provides an alternative to conventional reinforcement. This paper presents a control methodology for energy storage to reduce peak demand in a distribution network based on day-ahead demand forecasts and historical demand data. The control methodology pre-processes the forecast data prior to a planning phase to build in resilience to the inevitable errors between the forecasted and actual demand. The algorithm uses no real time adjustment so has an economical advantage over traditional storage control algorithms. Results show that peak demand on a single phase of a feeder can be reduced even when there are differences between the forecasted and the actual demand. In particular, results are presented that demonstrate when the algorithm is applied to a large number of single phase demand aggregations that it is possible to identify which of these aggregations are the most suitable candidates for the control methodology.
Resumo:
We report on use of iPads (and other IOS devices) for student fieldwork use and as electronic field notebooks and to promote active. We have used questionnaires and interviews of tutors and students to elicit their views and technology and iPad use for fieldwork. There is some reluctance for academic staff to relinquish paper notebooks for iPad use, whether in the classroom or on fieldwork, as well as use them for observational and measurement purposes. Students too are largely unaware of the potential of iPads for enhancing fieldwork. Apps can be configured for a wide variety of specific uses that make iPads useful for educational as well as social uses. Such abilities should be used to enhance existing practice as well as make new functionality. For example, for disabled students who find it difficult to use conventional note taking. iPads can be used to develop student self-directed learning and for group contributions. The technology becomes part of the students’ personal learning environments as well as at the heart of their knowledge spaces – academic and social. This blurring of boundaries is due to iPads’ usability to cultivate field use, instruction, assessment and feedback processes. iPads can become field microscopes and entries to citizen science and we see the iPad as the main ‘computing’ device for students in the near future. As part of the Bring Your Own Technology/Device (BYOD) the iPad has much to offer although, both staff and students need to be guided in the most effective use for self-directed education via development of Personal Learning Environments. A more student-oriented pedagogy is suggested to correspond to the increasing use of tablet technologies by students
Resumo:
In recent years, ZigBee has been proven to be an excellent solution to create scalable and flexible home automation networks. In a home automation network, consumer devices typically collect data from a home monitoring environment and then transmit the data to an end user through multi-hop communication without the need for any human intervention. However, due to the presence of typical obstacles in a home environment, error-free reception may not be possible, particularly for power constrained devices. A mobile sink based data transmission scheme can be one solution but obstacles create significant complexities for the sink movement path determination process. Therefore, an obstacle avoidance data routing scheme is of vital importance to the design of an efficient home automation system. This paper presents a mobile sink based obstacle avoidance routing scheme for a home monitoring system. The mobile sink collects data by traversing through the obstacle avoidance path. Through ZigBee based hardware implementation and verification, the proposed scheme successfully transmits data through the obstacle avoidance path to improve network performance in terms of life span, energy consumption and reliability. The application of this work can be applied to a wide range of intelligent pervasive consumer products and services including robotic vacuum cleaners and personal security robots1.
Resumo:
This paper reports findings from six field courses about student’s perceptions of iPads as mobile learning devices for fieldwork. Data were collected through surveys and focus groups. The key findings suggest that the multi-tool nature of the iPads and their portability were the main strengths. Students had some concerns over the safety of the iPads in adverse weather and rugged environments, though most of these concerns were eliminated after using the devices with protective cases. Reduced connectivity was found to be one of the main challenges for mobile learning. Finally, students and practitioners views of why they used the mobile devices for fieldwork did not align.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Background: Health care literature supports the development of accessible interventions that integrate behavioral economics, wearable devices, principles of evidence-based behavior change, and community support. However, there are limited real-world examples of large scale, population-based, member-driven reward platforms. Subsequently, a paucity of outcome data exists and health economic effects remain largely theoretical. To complicate matters, an emerging area of research is defining the role of Superusers, the small percentage of unusually engaged digital health participants who may influence other members. Objective: The objective of this preliminary study is to analyze descriptive data from GOODcoins, a self-guided, free-to-consumer engagement and rewards platform incentivizing walking, running and cycling. Registered members accessed the GOODcoins platform through PCs, tablets or mobile devices, and had the opportunity to sync wearables to track activity. Following registration, members were encouraged to join gamified group challenges and compare their progress with that of others. As members met challenge targets, they were rewarded with GOODcoins, which could be redeemed for planet- or people-friendly products. Methods: Outcome data were obtained from the GOODcoins custom SQL database. The reporting period was December 1, 2014 to May 1, 2015. Descriptive self-report data were analyzed using MySQL and MS Excel. Results: The study period includes data from 1298 users who were connected to an exercise tracking device. Females consisted of 52.6% (n=683) of the study population, 33.7% (n=438) were between the ages of 20-29, and 24.8% (n=322) were between the ages of 30-39. 77.5% (n=1006) of connected and active members met daily-recommended physical activity guidelines of 30 minutes, with a total daily average activity of 107 minutes (95% CI 90, 124). Of all connected and active users, 96.1% (n=1248) listed walking as their primary activity. For members who exchanged GOODcoins, the mean balance was 4,000 (95% CI 3850, 4150) at time of redemption, and 50.4% (n=61) of exchanges were for fitness or outdoor products, while 4.1% (n=5) were for food-related items. Participants were most likely to complete challenges when rewards were between 201-300 GOODcoins. Conclusions: The purpose of this study is to form a baseline for future research. Overall, results indicate that challenges and incentives may be effective for connected and active members, and may play a role in achieving daily-recommended activity guidelines. Registrants were typically younger, walking was the primary activity, and rewards were mainly exchanged for fitness or outdoor products. Remaining to be determined is whether members were already physically active at time of registration and are representative of healthy adherers, or were previously inactive and were incentivized to change their behavior. As challenges are gamified, there is an opportunity to investigate the role of superusers and healthy adherers, impacts on behavioral norms, and how cooperative games and incentives can be leveraged across stratified populations. Study limitations and future research agendas are discussed.
Resumo:
Background: Previous studies have pointed out that the mere elevation of the maxillary sinus membrane promotes bone formation without the use of augmentation materials. Purpose: This experimental study aimed at evaluating if the two-stage procedure for sinus floor augmentation could benefit from the use of a space-making device in order to increase the bone volume to enable later implant installation with good primary stability. Materials and Methods: Six male tufted capuchin primates (Cebus apella) were subjected to extraction of the three premolars and the first molar on both sides of the maxilla to create an edentulous area. The sinuses were opened using the lateral bone-wall window technique, and the membrane was elevated. One resorbable space-making device was inserted in each maxillary sinus, and the bone window was returned in place. The animals were euthanatized after 6 months, and biopsy blocks containing the whole maxillary sinus and surrounding soft tissues were prepared for ground sections. Results: The histological examination of the specimens showed bone formation in contact with both the schneiderian membrane and the device in most cases even when the device was displaced. The process of bone formation indicates that this technique is potentially useful for two-stage sinus floor augmentation. The lack of stabilization of the device within the sinus demands further improvement of space-makers for predictable bone augmentation. Conclusions: It is concluded that (1) the device used in this study did not trigger any important inflammatory reaction; (2) when the sinus membrane was elevated, bone formation was a constant finding; and (3) an ideal space-making device should be stable and elevate the membrane to ensure a maintained connection between the membrane and the secluded space.
Resumo:
Endostatin (ES) is a potent inhibitor of angiogenesis and tumor growth. Continuous ES delivery of ES improves the efficacy and potency of the antitumoral therapy. The TheraCyte (R) system is a polytetrafluoroethylene (PTFE) semipermeable membrane macroencapsulation system for implantation of genetically engineered cells specially designed for the in vivo delivery of therapeutic proteins, such as ES, which circumvents the problem of limited half-life and variation in circulating levels. In order to enable neovascularization at the tissues adjacent to the devices prior to ES secretion by the cells inside them, we designed a scheme in which empty TheraCyte (R) devices were preimplanted SC into immunodeficient mice. Only after healing (17 days later) were Chinese hamster ovary cells expressing ES injected into the preimplanted devices. In another model for device implantation, the cells expressing ES where loaded into the immunoisolation devices prior to implantation into the animals, and the TheraCyte (R) were then immediately implanted SC into the mice. Throughout the 2-month study, constant high ES levels of up to 3.7 mu g/ml were detected in the plasma of the mice preimplanted with the devices, while lower but also constant levels of ES (up to 2.1 mu g/ml plasma) were detected in the mice that had received devices preloaded with the ES-expressing cells. Immunohistochemistry using anti-ES antibody showed reaction within the device and outside it, demonstrating that ES, secreted by the confined recombinant cells, permeated through the membrane and reached the surrounding tissues.
Resumo:
High-resolution X-ray diffractometry is used to probe the nature of a diffraction-peak broadening previously noticed in quantum dots (QDs) systems with freestanding InAs islands on top of GaAs (001) substrates [Freitas et al., Phys. Status Solidi (A) 204, 2548 (2007)]. The procedure is hence extended to further investigate the capping process of InAs/GaAs QDs. A direct correlation is established between QDs growth rates and misorientation of lattice-planes at the samples surfaces. This effect provides an alternative too] for studying average strain fields on QDs systems in standard triple axis diffractometers running on X-ray tube sources, which are much more common than synchrotron facilities. (C) 2009 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim
Resumo:
Defects are usually present in organic polymer films and are commonly invoked to explain the low efficiency obtained in organic-based optoelectronic devices. We propose that controlled insertion of substitutional impurities may, on the contrary, tune the optoelectronic properties of the underivatized organic material and, in the case studied here, maximize the efficiency of a solar cell. We investigate a specific oxygen-impurity substitution, the keto-defect -(CH(2)-C=O)- in underivatized crystalline poly(p-phenylenevinylene) (PPV), and its impact on the electronic structure of the bulk film, through a combined classical (force-field) and quantum mechanical (DFT) approach. We find defect states which suggest a spontaneous electron hole separation typical of a donor acceptor interface, optimal for photovoltaic devices. Furthermore, the inclusion of oxygen impurities does not introduce defect states in the gap and thus, contrary to standard donor-acceptor systems, should preserve the intrinsic high open circuit voltage (V(oc)) that may be extracted from PPV-based devices.