224,662 research outputs found

    Ultra wideband: applications, technology and future perspectives

    Get PDF
    Ultra Wide Band (UWB) wireless communications offers a radically different approach to wireless communication compared to conventional narrow band systems. Global interest in the technology is huge. This paper reports on the state of the art of UWB wireless technology and highlights key application areas, technological challenges, higher layer protocol issues, spectrum operating zones and future drivers. The majority of the discussion focuses on the state of the art of UWB technology as it is today and in the near future

    Remote Cell Growth Sensing Using Self-Sustained Bio-Oscillations

    Get PDF
    A smart sensor system for cell culture real-time supervision is proposed, allowing for a signiïŹcant reduction in human effort applied to this type of assay. The approach converts the cell culture under test into a suitable “biological” oscillator. The system enables the remote acquisition and management of the “biological” oscillation signals through a secure web interface. The indirectly observed biological properties are cell growth and cell number, which are straightforwardly related to the measured bio-oscillation signal parameters, i.e., frequency and amplitude. The sensor extracts the information without complex circuitry for acquisition and measurement, taking advantage of the microcontroller features. A discrete prototype for sensing and remote monitoring is presented along with the experimental results obtained from the performed measurements, achieving the expected performance and outcomes

    Calm before the storm: the challenges of cloud computing in digital forensics

    Get PDF
    Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. Several new research challenges addressing this changing context are also identified and discussed

    Antenna Beam Coverage Concepts

    Get PDF
    The strawman Personal Access Satellite System (PASS) design calls for the use of a CONUS beam for transmission between the supplier and the satellite and for fixed beams for transmission between the basic personal terminal and the satellite. The satellite uses a 3 m main reflector for transmission at 20 GHz and a 2 m main reflector for reception at 30 GHz. There are several types of spot beams under consideration for the PASS system besides fixed beams. The beam pattern of a CONUS coverage switched beam is shown along with that of a scanning beam. A switched beam refers to one in which the signal from the satellite is connected alternatively to various feed horns. Scanning beams are taken to mean beams whose footprints are moved between contiguous regions in the beam's coverage area. The advantages and disadvantages of switched and/or scanning beams relative to fixed beams. The consequences of using switched/scanning in lieu of fixed beams in the PASS design and attempts are made to evaluate the listed advantages and disadvantages. Two uses of switched/scanning beams are examined. To illustrate the implications of switched beams use on PASS system design, operation at two beam scan rates is explored

    Distributed photonic instrumentation for smart grids

    Get PDF
    Photonic sensor networks possess the unique potential to provide the instrumentation infrastructure required in future smart grids by simultaneously addressing the issues of metrology and communications. In contrast to established optical CT/VT technology, recent developments at the University of Strathclyde in distributed point sensors for electrical and mechanical parameters demonstrate an enormous potential for realizing novel and effective monitoring and protection strategies for intelligent electrical networks and systems. In this paper, we review this technology and its capabilities, and describe recent work in power system monitoring and protection using hybrid electro-optical sensors. We show that wide-area visibility of multiple electrical and mechanical parameters from a single central location may be achieved using this technology, and discuss the implications for smart grid instrumentation

    Team Learning: A Theoretical Integration and Review

    Get PDF
    With the increasing emphasis on work teams as the primary architecture of organizational structure, scholars have begun to focus attention on team learning, the processes that support it, and the important outcomes that depend on it. Although the literature addressing learning in teams is broad, it is also messy and fraught with conceptual confusion. This chapter presents a theoretical integration and review. The goal is to organize theory and research on team learning, identify actionable frameworks and findings, and emphasize promising targets for future research. We emphasize three theoretical foci in our examination of team learning, treating it as multilevel (individual and team, not individual or team), dynamic (iterative and progressive; a process not an outcome), and emergent (outcomes of team learning can manifest in different ways over time). The integrative theoretical heuristic distinguishes team learning process theories, supporting emergent states, team knowledge representations, and respective influences on team performance and effectiveness. Promising directions for theory development and research are discussed

    Data compression: The end-to-end information systems perspective for NASA space science missions

    Get PDF
    The unique characteristics of compressed data have important implications to the design of space science data systems, science applications, and data compression techniques. The sequential nature or data dependence between each of the sample values within a block of compressed data introduces an error multiplication or propagation factor which compounds the effects of communication errors. The data communication characteristics of the onboard data acquisition, storage, and telecommunication channels may influence the size of the compressed blocks and the frequency of included re-initialization points. The organization of the compressed data are continually changing depending on the entropy of the input data. This also results in a variable output rate from the instrument which may require buffering to interface with the spacecraft data system. On the ground, there exist key tradeoff issues associated with the distribution and management of the science data products when data compression techniques are applied in order to alleviate the constraints imposed by ground communication bandwidth and data storage capacity

    Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

    Full text link
    The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA) systems. These actions can cause significant impacts to an interconnected power grid. Unlike the previous power blackouts, such high-impact initiating events can aggravate operating conditions, initiating instability that may lead to system-wide cascading failure. A systemic evaluation of "nightmare" scenarios is highly desirable for asset owners to manage and prioritize the maintenance and investment in protecting their cyberinfrastructure. This survey paper is a conceptual expansion of real-time monitoring, anomaly detection, impact analyses, and mitigation (RAIM) framework that emphasizes on the resulting impacts, both on steady-state and dynamic aspects of power system stability. Hypothetically, we associate the combinatorial analyses of steady state on substations/components outages and dynamics of the sequential switching orders as part of the permutation. The expanded framework includes (1) critical/noncritical combination verification, (2) cascade confirmation, and (3) combination re-evaluation. This paper ends with a discussion of the open issues for metrics and future design pertaining the impact quantification of cyber-related contingencies
    • 

    corecore