Search results for: wearable fitness devices/smartwatches
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2839

Search results for: wearable fitness devices/smartwatches

2449 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 122
2448 Feasibility Study to Enhance the Heat Transfer in a Typical Pressurized Water Reactor by Ribbed Spacer Grids

Authors: A. Ghadbane, M. N. Bouaziz, S. Hanini, B. Baggoura, M. Abbaci

Abstract:

The spacer grids are used to fix the rods bundle in a nuclear reactor core also act as turbulence-enhancing devices to improve the heat transfer from the hot surfaces of the rods to the surrounding coolant stream. Therefore, the investigation of thermal-hydraulic characteristics inside the rod bundles is important for optima design and safety operation of a nuclear reactor power plant. This contribution presents a feasibility study to use the ribbed spacer grids as mixing devices. The present study evaluates the effects of different ribbed spacer grids configurations on flow pattern and heat transfer in the downstream of the mixing devices in a 2 x 2 rod bundle array. This is done by obtaining velocity and pressure fields, turbulent intensity and the heat transfer coefficient using a three-dimensional CFD analysis. Numerical calculations are performed by employing K-ε turbulent model. The computational results obtained are promising and the comparison with standard spacer grids shows a clear difference which required the experimental approach to validate.

Keywords: PWR fuel assembly, spacer grid, mixing vane, swirl flow, turbulent heat transfer, CFD

Procedia PDF Downloads 473
2447 Analysis and Evaluation of Both AC and DC Standalone Photovoltaic Supply to Ethio-Telecom Access Layer Devices: The Case of Multi-Service Access Gateway in Adama

Authors: Frie Ayalew, Seada Hussen

Abstract:

Ethio-telecom holds a variety of telecom devices that needs a consistent power source to be operational. The company got this power mainly from the national grid and used this power source alone or with a generator and/or batteries as a backup. In addition, for off-grid or remote areas, the company commonly uses generators and batteries. But unstable diesel prices, huge expenses of fuel and transportation, and high carbon emissions are the main problems associated with fuel energy. So, the design of solar power with battery backup is a highly recommended and advantageous source for the next coming years. This project designs the AC and DC standalone photovoltaic supply to Ethio-telecom access layer devices for the case of multi-service access gateway in Adama. The design is done by using Homer software for both AC and DC loads. The project shows that the design of a solar based microgrid is the best option for the designed area.

Keywords: solar power, battery, inverter, Ethio-telecom, solar radiation

Procedia PDF Downloads 63
2446 Two-Dimensional Material-Based Negative Differential Resistance Device with High Peak-to- Valley Current Ratio for Multi-Valued Logic Circuits

Authors: Kwan-Ho Kim, Jin-Hong Park

Abstract:

The multi-valued logic (MVL) circuits, which can handle more than two logic states, are one of the promising solutions to overcome the bit density limitations of conventional binary logic systems. Recently, tunneling devices such as Esaki diode and resonant tunneling diode (RTD) have been extensively explored to construct the MVL circuits. These tunneling devices present a negative differential resistance (NDR) phenomenon in which a current decreases as a voltage increases in a specific applied voltage region. Due to this non-monotonic current behavior, the tunneling devices have more than two threshold voltages, consequently enabling construction of MVL circuits. Recently, the emergence of two dimensional (2D) van der Waals (vdW) crystals has opened up the possibility to fabricate such tunneling devices easily. Owing to the defect-free surface of the 2D crystals, a very abrupt junction interface could be formed through a simple stacking process, which subsequently allowed the implementation of a high-performance tunneling device. Here, we report a vdW heterostructure based tunneling device with multiple threshold voltages, which was fabricated with black phosphorus (BP) and hafnium diselenide (HfSe₂). First, we exfoliated BP on the SiO₂ substrate and then transferred HfSe₂ on BP using dry transfer method. The BP and HfSe₂ form type-Ⅲ heterojunction so that the highly doped n+/p+ interface can be easily implemented without additional electrical or chemical doping process. Owing to high natural doping at the junction, record high peak to valley ratio (PVCR) of 16 was observed to the best our knowledge in 2D materials based NDR device. Furthermore, based on this, we first demonstrate the feasibility of the ternary latch by connecting two multi-threshold voltage devices in series.

Keywords: two dimensional van der Waals crystal, multi-valued logic, negative differential resistnace, tunneling device

Procedia PDF Downloads 195
2445 Aerobic Training Combined with Nutritional Guidance as an Effective Strategy for Improving Aerobic Fitness and Reducing BMI in Inactive Adults

Authors: Leif Inge Tjelta, Gerd Lise Nordbotten, Cathrine Nyhus Hagum, Merete Hagen Helland

Abstract:

Overweight and obesity can lead to numerous health problems, and inactive people are more often overweight and obese compared to physically active people. Even a moderate weight loss can improve cardiovascular and endocrine disease risk factors. The aim of the study was to examine to what extent overweight and obese adults starting up with two weekly intensive running sessions had an increase in aerobic capacity, reduction in BMI and waist circumference and changes in body composition after 33 weeks of training. An additional aim was to see if there were differences between participants who, in addition to training, also received lifestyle modification education, including practical cooking (nutritional guidance and training group (NTG =32)) compared to those who were not given any nutritional guidance (training group (TG=40)). 72 participants (49 women), mean age of 46.1 ( ± 10.4) were included. Inclusion Criteria: Previous untrained and inactive adults in all age groups, BMI ≥ 25, desire to become fitter and reduce their BMI. The two weekly supervised training sessions consisted of 10 min warm up followed by 20 to 21 min effective interval running where the participants’ heart rate were between 82 and 92% of hearth rate maximum. The sessions were completed with ten minutes whole body strength training. Measures of BMI, waist circumference (WC) and 3000m running time were performed at the start of the project (T1), after 15 weeks (T2) and at the end of the project (T3). Measurements of fat percentage, muscle mass, and visceral fat were performed at T1 and T3. Twelve participants (9 women) from both groups, who all scored around average on the 3000 m pre-test, were chosen to do a VO₂max test at T1 and T3. The NTG were given ten theoretical sessions (80 minutes each) and eight practical cooking sessions (140 minutes each). There was a significant reduction in bout groups for WC and BMI from T1 to T2. There was not found any further reduction from T2 to T3. Although not significant, NTG reduced their WC more than TG. For both groups, the percentage reduction in WC was similar to the reduction in BMI. There was a decrease in fat percentage in both groups from pre-test to post-test, whereas, for muscle mass, a small, but insignificant increase was observed for both groups. There was a decrease in 3000m running time for both groups from T1 to T2 as well as from T2 to T3. The difference between T2 and T3 was not statistically significant. The 12 participants who tested VO₂max had an increase of 2.86 ( ± 3.84) mlkg⁻¹ min⁻¹ in VO₂max and 3:02 min (± 2:01 min) reduction in running time over 3000 m from T1 until T3. There was a strong, negative correlation between the two variables. The study shows that two intensive running session in 33 weeks can increase aerobic fitness and reduce BMI, WC and fat percent in inactive adults. Cost guidance in addition to training will give additional effect.

Keywords: interval training, nutritional guidance, fitness, BMI

Procedia PDF Downloads 129
2444 Using Deep Learning for the Detection of Faulty RJ45 Connectors on a Radio Base Station

Authors: Djamel Fawzi Hadj Sadok, Marrone Silvério Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner

Abstract:

A radio base station (RBS), part of the radio access network, is a particular type of equipment that supports the connection between a wide range of cellular user devices and an operator network access infrastructure. Nowadays, most of the RBS maintenance is carried out manually, resulting in a time consuming and costly task. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. This paper proposes and compares two deep learning solutions to identify attached RJ45 connectors on network ports. We named connector detection, the solution based on object detection, and connector classification, the one based on object classification. With the connector detection, we get an accuracy of 0:934, mean average precision 0:903. Connector classification, get a maximum accuracy of 0:981 and an AUC of 0:989. Although connector detection was outperformed in this study, this should not be viewed as an overall result as connector detection is more flexible for scenarios where there is no precise information about the environment and the possible devices. At the same time, the connector classification requires that information to be well-defined.

Keywords: radio base station, maintenance, classification, detection, deep learning, automation

Procedia PDF Downloads 176
2443 Thermal Neutron Detection Efficiency as a Function of Film Thickness for Front and Back Irradiation Detector Devices Coated with ¹⁰B, ⁶LiF, and Pure Li Thin Films

Authors: Vedant Subhash

Abstract:

This paper discusses the physics of the detection of thermal neutrons using thin-film coated semiconductor detectors. The thermal neutron detection efficiency as a function of film thickness is calculated for the front and back irradiation detector devices coated with ¹⁰B, ⁶LiF, and pure Li thin films. The detection efficiency for back irradiation devices is 4.15% that is slightly higher than that for front irradiation detectors, 4.0% for ¹⁰B films of thickness 2.4μm. The theoretically calculated thermal neutron detection efficiency using ¹⁰B film thickness of 1.1 μm for the back irradiation device is 3.0367%, which has an offset of 0.0367% from the experimental value of 3.0%. The detection efficiency values are compared and proved consistent with the given calculations.

Keywords: detection efficiency, neutron detection, semiconductor detectors, thermal neutrons

Procedia PDF Downloads 116
2442 Synthesis of AgInS2–ZnS at Low Temperature with Tunable Photoluminescence for Photovoltaic Applications

Authors: Nitu Chhikaraa, S. B. Tyagia, Kiran Jainb, Mamta Kharkwala

Abstract:

The I–III–VI2 semiconductor Nanocrystals such as AgInS2 have great interest for various applications such as optical devices (solar cell and LED), cellular Imaging and bio tagging etc. we synthesized the phase and shape controlled chalcopyrite AgInS2 (AIS) colloidal nanoparticles by thermal decomposition of metal xanthate at low temperature in an organic solvent’s containing surfactant molecules. Here we are focusing on enhancements of photoluminescence of AgInS2 Nps by coating of ZnS at low temperature for application of optical devices. The size of core shell Nps was less than 50nm.by increasing the time and temperature the emission of the wavelength of the Zn coated AgInS2 Nps could be adjusted from visible region to IR the QY of the AgInS2 Nps could be increased by coating of ZnS from 20 to 80% which was reasonably good as compared to those of the previously reported. The synthesized NPs were characterized by PL, UV, XRD and TEM.

Keywords: PL, UV, XRD, TEM

Procedia PDF Downloads 354
2441 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 136
2440 Forecasting Materials Demand from Multi-Source Ordering

Authors: Hui Hsin Huang

Abstract:

The downstream manufactures will order their materials from different upstream suppliers to maintain a certain level of the demand. This paper proposes a bivariate model to portray this phenomenon of material demand. We use empirical data to estimate the parameters of model and evaluate the RMSD of model calibration. The results show that the model has better fitness.

Keywords: recency, ordering time, materials demand quantity, multi-source ordering

Procedia PDF Downloads 515
2439 Bluetooth Communication Protocol Study for Multi-Sensor Applications

Authors: Joao Garretto, R. J. Yarwood, Vamsi Borra, Frank Li

Abstract:

Bluetooth Low Energy (BLE) has emerged as one of the main wireless communication technologies used in low-power electronics, such as wearables, beacons, and Internet of Things (IoT) devices. BLE’s energy efficiency characteristic, smart mobiles interoperability, and Over the Air (OTA) capabilities are essential features for ultralow-power devices, which are usually designed with size and cost constraints. Most current research regarding the power analysis of BLE devices focuses on the theoretical aspects of the advertising and scanning cycles, with most results being presented in the form of mathematical models and computer software simulations. Such computer modeling and simulations are important for the comprehension of the technology, but hardware measurement is essential for the understanding of how BLE devices behave in real operation. In addition, recent literature focuses mostly on the BLE technology, leaving possible applications and its analysis out of scope. In this paper, a coin cell battery-powered BLE Data Acquisition Device, with a 4-in-1 sensor and one accelerometer, is proposed and evaluated with respect to its Power Consumption. First, evaluations of the device in advertising mode with the sensors turned off completely, followed by the power analysis when each of the sensors is individually turned on and data is being transmitted, and concluding with the power consumption evaluation when both sensors are on and respectively broadcasting the data to a mobile phone. The results presented in this paper are real-time measurements of the electrical current consumption of the BLE device, where the energy levels that are demonstrated are matched to the BLE behavior and sensor activity.

Keywords: bluetooth low energy, power analysis, BLE advertising cycle, wireless sensor node

Procedia PDF Downloads 75
2438 Energy Efficient Building Design in Nigeria: An Assessment of the Effect of the Sun on Energy Consumption in Residential Buildings

Authors: Ekele T. Ochedi, Ahmad H. Taki, Birgit Painter

Abstract:

The effect of the sun and its path on thermal comfort and energy consumption in residential buildings in tropical climates constitute a serious concern for designers, building owners, and users. Passive design approaches based on the sun and its path have been identified as a means of reducing energy consumption as well as enhancing thermal comfort in buildings worldwide. Hence, a thorough understanding regarding the sun path is key to achieving this. This is necessary due to energy need, poor energy supply, and distribution, energy poverty, and over-dependence on electric generators for power supply in Nigeria. These challenges call for a change in the approach to energy-related issues, especially in terms of buildings. The aim of this study is to explore the influence of building orientation, glazing and the use of shading devices on residential buildings in Nigeria. This is intended to provide data that will guide designers in the design of energy-efficient residential buildings. The paper used EnergyPlus to analyze a typical semi-detached residential building in Lokoja, Nigeria using hourly weather data for a period of 10 years. Building performance was studied as well as possible improvement regarding different orientations, glazing types and shading devices. The simulation results show some reductions in energy consumption in response to changes in building orientation, types of glazing and the use of shading devices. The results indicate 29.45% reduction in solar gains and 1.90% in annual operative temperature using natural ventilation only. This shows a huge potential to reduce energy consumption and improve people’s well-being through the use of proper building orientation, glazing and appropriate shading devices on building envelope. The study concludes that for a significant reduction in total energy consumption by residential buildings, the design should focus on multiple design options rather than concentrating on one or few building elements. Moreover, the investigation confirms that energy performance modeling can be used by building designers to take advantage of the sun and to evaluate various design options.

Keywords: energy consumption, energy-efficient buildings, glazing, thermal comfort, shading devices, solar gains

Procedia PDF Downloads 187
2437 Effect of Treadmill Exercise on Fluid Intelligence in Early Adults: Electroencephalogram Study

Authors: Ladda Leungratanamart, Seree Chadcham

Abstract:

Fluid intelligence declines along with age, but it can be developed. For this reason, increasing fluid intelligence in young adults can be possible. This study examined the effects of a two-month treadmill exercise program on fluid intelligence. The researcher designed a treadmill exercise program to promote cardiorespiratory fitness. Thirty-eight healthy voluntary students from the Boromarajonani College of Nursing, Chon Buri were assigned randomly to an exercise group (n=18) and a control group (n=20). The experiment consisted of three sessions: The baseline session consisted of measuring the VO2max, electroencephalogram and behavioral response during performed the Raven Progressive Matrices (RPM) test, a measure of fluid intelligence. For the exercise session, an experimental group exercises using treadmill training at 60 % to 80 % maximum heart rate for 30 mins, three times per week, whereas the control group did not exercise. For the following two sessions, each participant was measured the same as baseline testing. The data were analyzed using the t-test to examine whether there is significant difference between the means of the two groups. The results showed that the mean VO2 max in the experimental group were significantly more than the control group (p<.05), suggesting a two-month treadmill exercise program can improve fluid intelligence. When comparing the behavioral data, it was found that experimental group performed RPM test more accurately and faster than the control group. Neuroelectric data indicated a significant increase in percentages of alpha band ERD (%ERD) at P3 and Pz compared to the pre-exercise condition and the control group. These data suggest that a two-month treadmill exercise program can contribute to the development of cardiorespiratory fitness which influences an increase fluid intelligence. Exercise involved in cortical activation in difference brain areas.

Keywords: treadmill exercise, fluid intelligence, raven progressive matrices test, alpha band

Procedia PDF Downloads 339
2436 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 385
2435 Lessons Learned from a Chronic Care Behavior Change Program: Outcome to Make Physical Activity a Habit

Authors: Doaa Alhaboby

Abstract:

Behavior change is a complex process that often requires ongoing support and guidance. Telecoaching programs have emerged as effective tools in facilitating behavior change by providing personalized support remotely. This abstract explores the lessons learned from a randomized controlled trial (RCT) evaluation of a telecoaching program focused on behavior change for Diabetics and discusses strategies for implementing these lessons to overcome the challenge of making physical activity a habit. The telecoaching program involved participants engaging in regular coaching sessions delivered via phone calls. These sessions aimed to address various aspects of behavior change, including goal setting, self-monitoring, problem-solving, and social support. Over the course of the program, participants received personalized guidance tailored to their unique needs and preferences. One of the key lessons learned from the RCT was the importance of engagement, readiness to change and the use of technology. Participants who set specific, measurable, attainable, relevant, and time-bound (SMART) goals were more likely to make sustained progress toward behavior change. Additionally, regular self-monitoring of behavior and progress was found to be instrumental in promoting accountability and motivation. Moving forward, implementing the lessons learned from the RCT can help individuals overcome the hardest part of behavior change: making physical activity a habit. One strategy is to prioritize consistency and establish a regular routine for physical activity. This may involve scheduling workouts at the same time each day or week and treating them as non-negotiable appointments. Additionally, integrating physical activity into daily life routines and taking into consideration the main challenges that can stop the process of integrating physical activity routines into the daily schedule can help make it more habitual. Furthermore, leveraging technology and digital tools can enhance adherence to physical activity goals. Mobile apps, wearable activity trackers, and online fitness communities can provide ongoing support, motivation, and accountability. These tools can also facilitate self-monitoring of behavior and progress, allowing individuals to track their activity levels and adjust their goals as needed. In conclusion, telecoaching programs offer valuable insights into behavior change and provide strategies for overcoming challenges, such as making physical activity a habit. By applying the lessons learned from these programs and incorporating them into daily life, individuals can cultivate sustainable habits that support their long-term health and well-being.

Keywords: lifestyle, behavior change, physical activity, chronic conditions

Procedia PDF Downloads 40
2434 Development of the Web-Based Multimedia N-Screen Service System for Cross Platform

Authors: S. Bae, J. Shin, S. Lee

Abstract:

As the development of smart devices such as Smart TV, Smartphone, Tablet PC, Laptop, the interest in N-Screen Services that can be cross-linked with heterogeneous devices is increasing. N-Screen means User-centric services that can share and constantly watch multimedia contents anytime and anywhere. However, the existing N-Screen system has the limitation that N-Screen system has to implement the application for each platform and device to provide multimedia service. To overcome this limitation, Multimedia N-Screen Service System is proposed through the web, and it is independent of different environments. The combination of Web and cloud computing technologies from this study results in increasing efficiency and reduction in costs.

Keywords: N-screen, web, cloud, multimedia

Procedia PDF Downloads 284
2433 Research on the Impact on Building Temperature and Ventilation by Outdoor Shading Devices in Hot-Humid Area: Through Measurement and Simulation on an Office Building in Guangzhou

Authors: Hankun Lin, Yiqiang Xiao, Qiaosheng Zhan

Abstract:

Shading devices (SDs) are widely used in buildings in the hot-humid climate areas for reducing cooling energy consumption for interior temperature, as the result of reducing the solar radiation directly. Contrasting the surface temperature of materials of SDs to the glass on the building façade could give more analysis for the shading effect. On the other side, SDs are much more used as the independence system on building façade in hot-humid area. This typical construction could have some impacts on building ventilation as well. This paper discusses the outdoor SDs’ effects on the building thermal environment and ventilation, through a set of measurements on a 2-floors office building in Guangzhou, China, which install a dynamic aluminum SD-system around the façade on 2nd-floor. The measurements recorded the in/outdoor temperature, relative humidity, velocity, and the surface temperature of the aluminum panel and the glaze. After that, a CFD simulation was conducted for deeper discussion of ventilation. In conclusion, this paper reveals the temperature differences on the different material of the façade, and finds that the velocity of indoor environment could be reduced by the outdoor SDs.

Keywords: outdoor shading devices, hot-humid area, temperature, ventilation, measurement, CFD

Procedia PDF Downloads 431
2432 Toward a Re-Definition of Mobile Learning

Authors: Mirna Diab

Abstract:

Mobile learning, or M-learning, drives the development of new teaching, learning, and assessment strategies in schools and colleges. With initiatives across states, districts, and institutions, the United States leads mobile learning, significantly impacting education. Since 2010, over 2,3 million American pupils have received their education via mobile devices, demonstrating its rapid expansion. Nonetheless, mobile learning lacks a consistent and explicit definition that helps educators, students, and stakeholders grasp its essence and implement it effectively. This article addresses the need for a revised definition by introducing readers to various mobile learning concepts and understandings. It seeks to raise awareness, clarify, and encourage making well-informed decisions regarding its incorporation as a potent learning tool.

Keywords: mobile learning, mobile pedagogy, mobile technological devices, learner mobility

Procedia PDF Downloads 49
2431 Optimizing Power in Sequential Circuits by Reducing Leakage Current Using Enhanced Multi Threshold CMOS

Authors: Patikineti Sreenivasulu, K. srinivasa Rao, A. Vinaya Babu

Abstract:

The demand for portability, performance and high functional integration density of digital devices leads to the scaling of complementary metal oxide semiconductor (CMOS) devices inevitable. The increase in power consumption, coupled with the increasing demand for portable/hand-held electronics, has made power consumption a dominant concern in the design of VLSI circuits today. MTCMOS technology provides low leakage and high performance operation by utilizing high speed, low Vt (LVT) transistors for logic cells and low leakage, high Vt (HVT) devices as sleep transistors. Sleep transistors disconnect logic cells from the supply and/or ground to reduce the leakage in the sleep mode. In this technology, energy consumption while doing the mode transition and minimum time required to turn ON the circuit upon receiving the wake up signal are issues to be considered because these can adversely impact the performance of VLSI circuit. In this paper we are introducing an enhancing method of MTCMOS technology to optimize the power in MTCMOS sequential circuits.

Keywords: power consumption, ultra-low power, leakage, sub threshold, MTCMOS

Procedia PDF Downloads 389
2430 Optimization of SOL-Gel Copper Oxide Layers for Field-Effect Transistors

Authors: Tomas Vincze, Michal Micjan, Milan Pavuk, Martin Weis

Abstract:

In recent years, alternative materials are gaining attention to replace polycrystalline and amorphous silicon, which are a standard for low requirement devices, where silicon is unnecessarily and high cost. For that reason, metal oxides are envisioned as the new materials for these low-requirement applications such as sensors, solar cells, energy storage devices, or field-effect transistors. Their most common way of layer growth is sputtering; however, this is a high-cost fabrication method, and a more industry-suitable alternative is the sol-gel method. In this group of materials, many oxides exhibit a semiconductor-like behavior with sufficiently high mobility to be applied as transistors. The sol-gel method is a cost-effective deposition technique for semiconductor-based devices. Copper oxides, as p-type semiconductors with free charge mobility up to 1 cm2/Vs., are suitable replacements for poly-Si or a-Si:H devices. However, to reach the potential of silicon devices, a fine-tuning of material properties is needed. Here we focus on the optimization of the electrical parameters of copper oxide-based field-effect transistors by modification of precursor solvent (usually 2-methoxy ethanol). However, to achieve solubility and high-quality films, a better solvent is required. Since almost no solvents have both high dielectric constant and high boiling point, an alternative approach was proposed with blend solvents. By mixing isopropyl alcohol (IPA) and 2-methoxy ethanol (2ME) the precursor reached better solubility. The quality of the layers fabricated using mixed solutions was evaluated in accordance with the surface morphology and electrical properties. The IPA:2ME solution mixture reached optimum results for the weight ratio of 1:3. The cupric oxide layers for optimal mixture had the highest crystallinity and highest effective charge mobility.

Keywords: copper oxide, field-effect transistor, semiconductor, sol-gel method

Procedia PDF Downloads 114
2429 Switching Losses in Power Electronic Converter of Switched Reluctance Motor

Authors: Ali Asghar Memon

Abstract:

A cautious and astute selection of switching devices used in power electronic converters of a switched reluctance (SR) motor is required. It is a matter of choice of best switching devices with respect to their switching ability rather than fulfilling the number of switches. This paper highlights the computational determination of switching losses comprising of switch-on, switch-off and conduction losses respectively by using experimental data in simulation model of a SR machine. The finding of this research is helpful for proper selection of electronic switches and suitable converter topology for switched reluctance motor.

Keywords: converter, operating modes, switched reluctance motor, switching losses

Procedia PDF Downloads 485
2428 Classification Method for Turnover While Sleeping Using Multi-Point Unconstrained Sensing Devices

Authors: K. Shiba, T. Kobayashi, T. Kaburagi, Y. Kurihara

Abstract:

Elderly population in the world is increasing, and consequently, their nursing burden is also increasing. In such situations, monitoring and evaluating their daily action facilitates efficient nursing care. Especially, we focus on an unconscious activity during sleep, i.e. turnover. Monitoring turnover during sleep is essential to evaluate various conditions related to sleep. Bedsores are considered as one of the monitoring conditions. Changing patient’s posture every two hours is required for caregivers to prevent bedsore. Herein, we attempt to develop an unconstrained nocturnal monitoring system using a sensing device based on piezoelectric ceramics that can detect the vibrations owing to human body movement on the bed. In the proposed method, in order to construct a multi-points sensing, we placed two sensing devices under the right and left legs at the head-side of an ordinary bed. Using this equipment, when a subject lies on the bed, feature is calculated from the output voltages of the sensing devices. In order to evaluate our proposed method, we conducted an experiment with six healthy male subjects. Consequently, the period during which turnover occurs can be correctly classified as the turnover period with 100% accuracy.

Keywords: turnover, piezoelectric ceramics, multi-points sensing, unconstrained monitoring system

Procedia PDF Downloads 180
2427 Design and Implement a Remote Control Robot Controlled by Zigbee Wireless Network

Authors: Sinan Alsaadi, Mustafa Merdan

Abstract:

Communication and access systems can be made with many methods in today’s world. These systems are such standards as Wifi, Wimax, Bluetooth, GPS and GPRS. Devices which use these standards also use system resources excessively in direct proportion to their transmission speed. However, large-scale data communication is not always needed. In such cases, a technology which will use system resources as little as possible and support smart network topologies has been needed in order to enable the transmissions of such small packet data and provide the control for this kind of devices. IEEE issued 802.15.4 standard upon this necessity and enabled the production of Zigbee protocol which takes these standards as its basis and devices which support this protocol. In our project, this communication protocol was preferred. The aim of this study is to provide the immediate data transmission of our robot from the field within the scope of the project. In addition, making the communication with the robot through Zigbee Protocol has also been aimed. While sitting on the computer, obtaining the desired data from the region where the robot is located has been taken as the basis. Arduino Uno R3 microcontroller which provides the control mechanism, 1298 shield as the motor driver.

Keywords: ZigBee, wireless network, remote monitoring, smart home, agricultural industry

Procedia PDF Downloads 262
2426 Room Temperature Sensitive Broadband Terahertz Photo Response Using Platinum Telluride Based Devices

Authors: Alka Jakhar, Harmanpreet Kaur Sandhu, Samaresh Das

Abstract:

The Terahertz (THz) technology-based devices are heightening at an alarming rate on account of the wide range of applications in imaging, security, communication, and spectroscopic field. The various available room operational THz detectors, including Golay cell, pyroelectric detector, field-effect transistors, and photoconductive antennas, have some limitations such as narrow-band response, slow response speed, transit time limits, and complex fabrication process. There is an urgent demand to explore new materials and device structures to accomplish efficient THz detection systems. Recently, TMDs including topological semimetals and topological insulators such as PtSe₂, MoTe₂, WSe₂, and PtTe₂ provide novel feasibility for photonic and optical devices. The peculiar properties of these materials, such as Dirac cone, fermions presence, nonlinear optical response, high conductivity, and ambient stability, make them worthy for the development of the THz devices. Here, the platinum telluride (PtTe₂) based devices have been demonstrated for THz detection in the frequency range of 0.1-1 THz. The PtTe₂ is synthesized by direct selenization of the sputtered platinum film on the high-resistivity silicon substrate by using the chemical vapor deposition (CVD) method. The Raman spectra, XRD, and XPS spectra confirm the formation of the thin PtTe₂ film. The PtTe₂ channel length is 5µm and it is connected with a bow-tie antenna for strong THz electric field confinement in the channel. The characterization of the devices has been carried out in a wide frequency range from 0.1-1 THz. The induced THz photocurrent is measured by using lock-in-amplifier after preamplifier. The maximum responsivity is achieved up to 1 A/W under self-biased mode. Further, this responsivity has been increased by applying biasing voltage. This photo response corresponds to low energy THz photons is mainly due to the photo galvanic effect in PtTe₂. The DC current is induced along the PtTe₂ channel, which is directly proportional to the amplitude of the incident THz electric field. Thus, these new topological semimetal materials provide new pathways for sensitive detection and sensing applications in the THz domain.

Keywords: terahertz, detector, responsivity, topological-semimetals

Procedia PDF Downloads 146
2425 Cloud-Based Mobile-to-Mobile Computation Offloading

Authors: Ebrahim Alrashed, Yousef Rafique

Abstract:

Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.

Keywords: computational offloading, power conservation, cloud, sandboxing

Procedia PDF Downloads 371
2424 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 377
2423 Control of a Quadcopter Using Genetic Algorithm Methods

Authors: Mostafa Mjahed

Abstract:

This paper concerns the control of a nonlinear system using two different methods, reference model and genetic algorithm. The quadcopter is a nonlinear unstable system, which is a part of aerial robots. It is constituted by four rotors placed at the end of a cross. The center of this cross is occupied by the control circuit. Its motions are governed by six degrees of freedom: three rotations around 3 axes (roll, pitch and yaw) and the three spatial translations. The control of such system is complex, because of nonlinearity of its dynamic representation and the number of parameters, which it involves. Numerous studies have been developed to model and stabilize such systems. The classical PID and LQ correction methods are widely used. If the latter represent the advantage to be simple because they are linear, they reveal the drawback to require the presence of a linear model to synthesize. It also implies the complexity of the established laws of command because the latter must be widened on all the domain of flight of these quadcopter. Note that, if the classical design methods are widely used to control aeronautical systems, the Artificial Intelligence methods as genetic algorithms technique receives little attention. In this paper, we suggest comparing two PID design methods. Firstly, the parameters of the PID are calculated according to the reference model. In a second phase, these parameters are established using genetic algorithms. By reference model, we mean that the corrected system behaves according to a reference system, imposed by some specifications: settling time, zero overshoot etc. Inspired from the natural evolution of Darwin's theory advocating the survival of the best, John Holland developed this evolutionary algorithm. Genetic algorithm (GA) possesses three basic operators: selection, crossover and mutation. We start iterations with an initial population. Each member of this population is evaluated through a fitness function. Our purpose is to correct the behavior of the quadcopter around three axes (roll, pitch and yaw) with 3 PD controllers. For the altitude, we adopt a PID controller.

Keywords: quadcopter, genetic algorithm, PID, fitness, model, control, nonlinear system

Procedia PDF Downloads 410
2422 Design and Fabrication of an Electrostatically Actuated Parallel-Plate Mirror by 3D-Printer

Authors: J. Mizuno, S. Takahashi

Abstract:

In this paper, design and fabrication of an actuated parallel-plate mirror based on a 3D-printer is described. The mirror and electrode layers are fabricated separately and assembled thereafter. The alignment is performed by dowel pin-hole pairs fabricated on the respective layers. The electrodes are formed on the surface of the electrode layer by Au ion sputtering using a suitable mask, which is also fabricated by a 3D-printer.For grounding the mirror layer, except the contact area with the electrode paths, all the surface is Au ion sputtered. 3D-printers are widely used for creating 3D models or mock-ups. The authors have recently proposed that these models can perform electromechanical functions such as actuators by suitably masking them followed by metallization process. Since the smallest possible fabrication size is in the order of sub-millimeters, these electromechanical devices are named by the authors as SMEMS (Sub-Milli Electro-Mechanical Systems) devices. The proposed mirror described in this paper which consists of parallel-plate electrostatic actuators is also one type of SMEMS devices. In addition, SMEMS is totally environment-clean compared to MEMS (Micro Electro-Mechanical Systems) fabrication processes because any hazardous chemicals or gases are utilized.

Keywords: MEMS, parallel-plate mirror, SMEMS, 3D-printer

Procedia PDF Downloads 418
2421 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators

Authors: Raluca Ana Maria Viziteu, Anna Prudnikova

Abstract:

Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.

Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling

Procedia PDF Downloads 66
2420 Flexible Alternative Current Transmission System Impact on Grid Stability and Power Markets

Authors: Abdulrahman M. Alsuhaibani, Martin Maken

Abstract:

FACTS devices have great influence on the grid stability and power markets price. Recently, there is intent to integrate a large scale of renewable energy sources to the power system which in turn push the power system to operate closer to the security limits. This paper discusses the power system stability and reliability improvement that could be achieved by using FACTS. There is a comparison between FACTS devices to evaluate their performance for different functions. A case study has also been made about its effect on reducing generation cost and minimizing transmission losses which have good impact on efficient and economic operation of electricity markets

Keywords: FACTS, grid stability, spot price, OPF

Procedia PDF Downloads 136