902 resultados para resonant tunneling devices
Resumo:
The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.
Resumo:
A pair of circular loops of the same radius set at a distance form a closed induction circuit. Coupled to a capacitor, these loops form a resonant circuit wherein energy is transported from one to the other. When a current is introduced into one of the loops, it is received by its companion. This is due to the propagation of magnetic waves through the medium, in this instance, atmospheric air of a characteristic impedance.
Resumo:
Energy storage is a potential alternative to conventional network reinforcementof the low voltage (LV) distribution network to ensure the grid’s infrastructure remainswithin its operating constraints. This paper presents a study on the control of such storagedevices, owned by distribution network operators. A deterministic model predictive control (MPC) controller and a stochastic receding horizon controller (SRHC) are presented, wherethe objective is to achieve the greatest peak reduction in demand, for a given storagedevice specification, taking into account the high level of uncertainty in the prediction of LV demand. The algorithms presented in this paper are compared to a standard set-pointcontroller and bench marked against a control algorithm with a perfect forecast. A specificcase study, using storage on the LV network, is presented, and the results of each algorithmare compared. A comprehensive analysis is then carried out simulating a large number of LV networks of varying numbers of households. The results show that the performance of each algorithm is dependent on the number of aggregated households. However, on a typical aggregation, the novel SRHC algorithm presented in this paper is shown to outperform each of the comparable storage control techniques.
Resumo:
The Distribution Network Operators (DNOs) role is becoming more difficult as electric vehicles and electric heating penetrate the network, increasing the demand. As a result it becomes harder for the distribution networks infrastructure to remain within its operating constraints. Energy storage is a potential alternative to conventional network reinforcement such as upgrading cables and transformers. The research presented here in this paper shows that due to the volatile nature of the LV network, the control approach used for energy storage has a significant impact on performance. This paper presents and compares control methodologies for energy storage where the objective is to get the greatest possible peak demand reduction across the day from a pre-specified storage device. The results presented show the benefits and detriments of specific types of control on a storage device connected to a single phase of an LV network, using aggregated demand profiles based on real smart meter data from individual homes. The research demonstrates an important relationship between how predictable an aggregation is and the best control methodology required to achieve the objective.
Resumo:
Reinforcing the Low Voltage (LV) distribution network will become essential to ensure it remains within its operating constraints as demand on the network increases. The deployment of energy storage in the distribution network provides an alternative to conventional reinforcement. This paper presents a control methodology for energy storage to reduce peak demand in a distribution network based on day-ahead demand forecasts and historical demand data. The control methodology pre-processes the forecast data prior to a planning phase to build in resilience to the inevitable errors between the forecasted and actual demand. The algorithm uses no real time adjustment so has an economical advantage over traditional storage control algorithms. Results show that peak demand on a single phase of a feeder can be reduced even when there are differences between the forecasted and the actual demand. In particular, results are presented that demonstrate when the algorithm is applied to a large number of single phase demand aggregations that it is possible to identify which of these aggregations are the most suitable candidates for the control methodology.
Resumo:
In recent years, ZigBee has been proven to be an excellent solution to create scalable and flexible home automation networks. In a home automation network, consumer devices typically collect data from a home monitoring environment and then transmit the data to an end user through multi-hop communication without the need for any human intervention. However, due to the presence of typical obstacles in a home environment, error-free reception may not be possible, particularly for power constrained devices. A mobile sink based data transmission scheme can be one solution but obstacles create significant complexities for the sink movement path determination process. Therefore, an obstacle avoidance data routing scheme is of vital importance to the design of an efficient home automation system. This paper presents a mobile sink based obstacle avoidance routing scheme for a home monitoring system. The mobile sink collects data by traversing through the obstacle avoidance path. Through ZigBee based hardware implementation and verification, the proposed scheme successfully transmits data through the obstacle avoidance path to improve network performance in terms of life span, energy consumption and reliability. The application of this work can be applied to a wide range of intelligent pervasive consumer products and services including robotic vacuum cleaners and personal security robots1.
Resumo:
This paper reports findings from six field courses about student’s perceptions of iPads as mobile learning devices for fieldwork. Data were collected through surveys and focus groups. The key findings suggest that the multi-tool nature of the iPads and their portability were the main strengths. Students had some concerns over the safety of the iPads in adverse weather and rugged environments, though most of these concerns were eliminated after using the devices with protective cases. Reduced connectivity was found to be one of the main challenges for mobile learning. Finally, students and practitioners views of why they used the mobile devices for fieldwork did not align.
Resumo:
Mobile devices can enhance undergraduate research projects and students’ research capabilities. The use of mobile devices such as tablet computers will not automatically make undergraduates better researchers, but their use should make investigations, writing, and publishing more effective and may even save students time. We have explored some of the possibilities of using “tablets” and “smartphones” to aid the research and inquiry process in geography and bioscience fieldwork. We provide two case studies as illustration of how students working in small research groups use mobile devices to gather and analyze primary data in field-based inquiry. Since April 2010, Apple’s iPad has changed the way people behave in the digital world and how they access their music, watch videos, or read their email much as the entrepreneurs Steve Jobs and Jonathan Ive intended. Now with “apps” and “the cloud” and the ubiquitous references to them appearing in the press and on TV, academics’ use of tablets is also having an impact on education and research. In our discussion we will refer to use of smartphones such as the iPhone, iPod, and Android devices under the term “tablet”. Android and Microsoft devices may not offer the same facilities as the iPad/iphone, but many app producers now provide versions for several operating systems. Smartphones are becoming more affordable and ubiquitous (Melhuish and Falloon 2010), but a recent study of undergraduate students (Woodcock et al. 2012, 1) found that many students who own smartphones are “largely unaware of their potential to support learning”. Importantly, however, students were found to be “interested in and open to the potential as they become familiar with the possibilities” (Woodcock et al. 2012). Smartphones and iPads could be better utilized than laptops when conducting research in the field because of their portability (Welsh and France 2012). It is imperative for faculty to provide their students with opportunities to discover and employ the potential uses of mobile devices in their learning. However, it is not only the convenience of the iPad or tablet devices or smartphones we wish to promote, but also a way of thinking and behaving digitally. We essentially suggest that making a tablet the center of research increases the connections between related research activities.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Background: Health care literature supports the development of accessible interventions that integrate behavioral economics, wearable devices, principles of evidence-based behavior change, and community support. However, there are limited real-world examples of large scale, population-based, member-driven reward platforms. Subsequently, a paucity of outcome data exists and health economic effects remain largely theoretical. To complicate matters, an emerging area of research is defining the role of Superusers, the small percentage of unusually engaged digital health participants who may influence other members. Objective: The objective of this preliminary study is to analyze descriptive data from GOODcoins, a self-guided, free-to-consumer engagement and rewards platform incentivizing walking, running and cycling. Registered members accessed the GOODcoins platform through PCs, tablets or mobile devices, and had the opportunity to sync wearables to track activity. Following registration, members were encouraged to join gamified group challenges and compare their progress with that of others. As members met challenge targets, they were rewarded with GOODcoins, which could be redeemed for planet- or people-friendly products. Methods: Outcome data were obtained from the GOODcoins custom SQL database. The reporting period was December 1, 2014 to May 1, 2015. Descriptive self-report data were analyzed using MySQL and MS Excel. Results: The study period includes data from 1298 users who were connected to an exercise tracking device. Females consisted of 52.6% (n=683) of the study population, 33.7% (n=438) were between the ages of 20-29, and 24.8% (n=322) were between the ages of 30-39. 77.5% (n=1006) of connected and active members met daily-recommended physical activity guidelines of 30 minutes, with a total daily average activity of 107 minutes (95% CI 90, 124). Of all connected and active users, 96.1% (n=1248) listed walking as their primary activity. For members who exchanged GOODcoins, the mean balance was 4,000 (95% CI 3850, 4150) at time of redemption, and 50.4% (n=61) of exchanges were for fitness or outdoor products, while 4.1% (n=5) were for food-related items. Participants were most likely to complete challenges when rewards were between 201-300 GOODcoins. Conclusions: The purpose of this study is to form a baseline for future research. Overall, results indicate that challenges and incentives may be effective for connected and active members, and may play a role in achieving daily-recommended activity guidelines. Registrants were typically younger, walking was the primary activity, and rewards were mainly exchanged for fitness or outdoor products. Remaining to be determined is whether members were already physically active at time of registration and are representative of healthy adherers, or were previously inactive and were incentivized to change their behavior. As challenges are gamified, there is an opportunity to investigate the role of superusers and healthy adherers, impacts on behavioral norms, and how cooperative games and incentives can be leveraged across stratified populations. Study limitations and future research agendas are discussed.
Resumo:
Background: Previous studies have pointed out that the mere elevation of the maxillary sinus membrane promotes bone formation without the use of augmentation materials. Purpose: This experimental study aimed at evaluating if the two-stage procedure for sinus floor augmentation could benefit from the use of a space-making device in order to increase the bone volume to enable later implant installation with good primary stability. Materials and Methods: Six male tufted capuchin primates (Cebus apella) were subjected to extraction of the three premolars and the first molar on both sides of the maxilla to create an edentulous area. The sinuses were opened using the lateral bone-wall window technique, and the membrane was elevated. One resorbable space-making device was inserted in each maxillary sinus, and the bone window was returned in place. The animals were euthanatized after 6 months, and biopsy blocks containing the whole maxillary sinus and surrounding soft tissues were prepared for ground sections. Results: The histological examination of the specimens showed bone formation in contact with both the schneiderian membrane and the device in most cases even when the device was displaced. The process of bone formation indicates that this technique is potentially useful for two-stage sinus floor augmentation. The lack of stabilization of the device within the sinus demands further improvement of space-makers for predictable bone augmentation. Conclusions: It is concluded that (1) the device used in this study did not trigger any important inflammatory reaction; (2) when the sinus membrane was elevated, bone formation was a constant finding; and (3) an ideal space-making device should be stable and elevate the membrane to ensure a maintained connection between the membrane and the secluded space.
Resumo:
Resonant interactions among equatorial waves in the presence of a diurnally varying heat source are studied in the context of the diabatic version of the equatorial beta-plane primitive equations for a motionless, hydrostatic, horizontally homogeneous and stably stratified background atmosphere. The heat source is assumed to be periodic in time and of small amplitude [i.e., O(epsilon)] and is prescribed to roughly represent the typical heating associated with deep convection in the tropical atmosphere. In this context, using the asymptotic method of multiple time scales, the free linear Rossby, Kelvin, mixed Rossby-gravity, and inertio-gravity waves, as well as their vertical structures, are obtained as leading-order solutions. These waves are shown to interact resonantly in a triad configuration at the O(e) approximation, and the dynamics of these interactions have been studied in the presence of the forcing. It is shown that for the planetary-scale wave resonant triads composed of two first baroclinic equatorially trapped waves and one barotropic Rossby mode, the spectrum of the thermal forcing is such that only one of the triad components is resonant with the heat source. As a result, to illustrate the role of the diurnal forcing in these interactions in a simplified fashion, two kinds of triads have been analyzed. The first one refers to triads composed of a k = 0 first baroclinic geostrophic mode, which is resonant with the stationary component of the diurnal heat source, and two dispersive modes, namely, a mixed Rossby-gravity wave and a barotropic Rossby mode. The other class corresponds to triads composed of two first baroclinic inertio-gravity waves in which the highest-frequency wave resonates with a transient harmonic of the forcing. The integration of the asymptotic reduced equations for these selected resonant triads shows that the stationary component of the diurnal heat source acts as an ""accelerator"" for the energy exchanges between the two dispersive waves through the excitation of the catalyst geostrophic mode. On the other hand, since in the second class of triads the mode that resonates with the forcing is the most energetically active member because of the energy constraints imposed by the triad dynamics, the results show that the convective forcing in this case is responsible for a longer time scale modulation in the resonant interactions, generating a period doubling in the energy exchanges. The results suggest that the diurnal variation of tropical convection might play an important role in generating low-frequency fluctuations in the atmospheric circulation through resonant nonlinear interactions.
Resumo:
Weakly nonlinear interactions among equatorial waves have been explored in this paper using the adiabatic version of the equatorial beta-plane primitive equations in isobaric coordinates. Assuming rigid lid vertical boundary conditions, the conditions imposed at the surface and at the top of the troposphere were expanded in a Taylor series around two isobaric surfaces in an approach similar to that used in the theory of surface-gravity waves in deep water and capillary-gravity waves. By adopting the asymptotic method of multiple time scales, the equatorial Rossby, mixed Rossby-gravity, inertio-gravity, and Kelvin waves, as well as their vertical structures, were obtained as leading-order solutions. These waves were shown to interact resonantly in a triad configuration at the O(epsilon) approximation. The resonant triads whose wave components satisfy a resonance condition for their vertical structures were found to have the most significant interactions, although this condition is not excluding, unlike the resonant conditions for the zonal wavenumbers and meridional modes. Thus, the analysis has focused on such resonant triads. In general, it was found that for these resonant triads satisfying the resonance condition in the vertical direction, the wave with the highest absolute frequency always acts as an energy source (or sink) for the remaining triad components, as usually occurs in several other physical problems in fluid dynamics. In addition, the zonally symmetric geostrophic modes act as catalyst modes for the energy exchanges between two dispersive waves in a resonant triad. The integration of the reduced asymptotic equations for a single resonant triad shows that, for the initial mode amplitudes characterizing realistic magnitudes of atmospheric flow perturbations, the modes in general exchange energy on low-frequency (intraseasonal and/or even longer) time scales, with the interaction period being dependent upon the initial mode amplitudes. Potential future applications of the present theory to the real atmosphere with the inclusion of diabatic forcing, dissipation, and a more realistic background state are also discussed.
Resumo:
We perform a statistical study of the process of orbital determination of the HD82943 extrasolar planetary system, using the current observational data set of N = 165 radial velocity (RV) measurements. Our aim is to analyse the dispersion of possible orbital fits leading to residuals compatible with the best solution, and to discuss the sensitivity of the results with respect to both the data set and the error distribution around the best fit. Although some orbital parameters (e.g. semimajor axis) appear well constrained, we show that the best fits for the HD82943 system are not robust, and at present it is not possible to estimate reliable solutions for these bodies. Finally, we discuss the possibility of a third planet, with a mass of 0.35M(Jup) and an orbital period of 900 d. Stability analysis and simulations of planetary migration indicate that such a hypothetical three-planet system could be locked in a double 2/1 mean-motion resonance, similar to the so-called Laplace resonance of the three inner Galilean satellites of Jupiter.