4,016 research outputs found

    Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

    Full text link
    Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers' premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoT-aided SG systems

    A Course Module On Application Logic Flaws

    Get PDF
    Software security is extremely important, and even thoroughly tested code may still have exploitable vulnerabilities. Some of these vulnerabilities are caused by logic flaws. Due to the nature of application or business logic, few automated tools can test for these types of security issues. Therefore, it is important for students to learn how to reduce the number of logic flaws when developing software, and how to test for them manually. A course module with a case study was created to teach students about this topic. Case-based teaching methods are used because it allows students to better apply learned skills to real world industrial settings, and there is a lack of case studies available for current software engineering curriculum. The course module includes an introduction, a quiz on the reading, an animated PowerPoint about the case, and a set of discussion questions. The introduction covers what logic flaws are, reducing logic flaws during software development, and how to test for them manually. The case is about eCommerce merchant software Bigcommerce using PayPal Express to collect payment. A flaw lets attackers complete an expensive order using the payment intended for a cheaper order. An animation was created to trace the HTTP interactions and back-end code representing the steps of the exploit from this case, and explain the manual testing method used to discover the exploit. A set of discussion questions has students apply this method to similar code, to find potential vulnerabilities and then fix them. This course module was taught in COMP 727 Secure Software Engineering at North Carolina A&T State University in the Spring 2015 semester. A pre-survey and post-survey on the learning objectives shows students felt they improved their knowledge and skills relating to application logic flaws. A quiz based on the reading shows students understood the material. The quality of student discussions was very high. Discussion question results were graded using a rubric, and three-quarters of the class received an 85% grade or higher. Overall, this case study was effective at teaching students about application logic flaws. It will be made available to other universities, and can be easily integrated into existing curriculum

    Digital Transformation in Healthcare

    Get PDF
    This book presents a collection of papers revealing the impact of advanced computation and instrumentation on healthcare. It highlights the increasing global trend driving innovation for a new era of multifunctional technologies for personalized digital healthcare. Moreover, it highlights that contemporary research on healthcare is performed on a multidisciplinary basis comprising computational engineering, biomedicine, biomedical engineering, electronic engineering, and automation engineering, among other areas

    iPhone in NASA Ground Operations

    Get PDF
    A comprehensive review of the literature and historical background of NASA established a need for an easy-to-implement technological improvement to displaying procedures which is cost effective and risk reducing. Previous unsuccessful attempts have led this team to explore the practicality of using a mobile handheld device. The major products, inputs, resources, constraints, planning and effort required for consideration of this type of solution were outlined. After analyzing the physical, environmental, life-cycle, functional, and socio-technical requirements, a Functional Analysis was performed to describe the top-level, second-level, and third-level functions of the system requirements. In addition, the risk/value proposition of conversion to a new technology was considered and gave a blueprint for transitioning along with the tasks necessary to implement the device into the Vehicle Assembly Building's (VAB) current infrastructure. A Work Breakdown Structure (WBS) described the elemental work items of the implementation. Once the viability of this system was confirmed, a device was selected through use of technical design comparison methods including the Pugh Matrix and House of Quality. Comparison and evaluation of the Apple iPhone, Motorola Q, Blackberry, PC Notebook, and PDA revealed that the iPhone is the most suitable device for this task. This paper outlines the device design/ architecture, as well as some of the required infrastructure

    U.S. Military Innovation In The 21st Century: The Era Of The “Spin-On”

    Get PDF
    The intersection between the U.S. military and technological innovation, a “military-innovation nexus,” has led to the genesis of key technologies, including nuclear energy, general computing, GPS, and satellite technology from World War II to the present. However, an evolving innovation context in the twenty-first century, including the leadership of the commercial sector in technology innovation and the resurgence of great power competition, has led to doubts about the ability of the Department of Defense to discover and promote the technological innovations of the future. The Third Offset Strategy was formulated in 2014 in response to these concerns: The offset strategy promulgated reforms to bring the Pentagon and the commercial sector closer together while creating alternative contracting mechanisms for streamlined procurement and prototyping. Using defense biometrics and artificial intelligence as case studies of spin-on innovations adopted by the military, this Article seeks to understand the efficacy of the reforms undertaken under the auspices of the Third Offset Strategy to improve the institutional underpinnings of the U.S. innovation system for national security. I argue that the Third Offset Strategy has allowed the Pentagon to more effectively procure, develop, and field commercial technologies in the twenty-first century, and I conclude by proposing modest recommendations for the successful acquisition of spin-on innovations

    University Library Annual Report FY 2012-2013

    Get PDF
    • …
    corecore