106,641 research outputs found

    Carbon Nanotube Yarn for Fiber-Shaped Electrical Sensors, Actuators, and Energy Storage for Smart Systems

    Get PDF
    Smart systems are those that display autonomous or collaborative functionalities, and include the ability to sense multiple inputs, to respond with appropriate operations, and to control a given situation. In certain circumstances, it is also of great interest to retain flexible, stretchable, portable, wearable, and/or implantable attributes in smart electronic systems. Among the promising candidate smart materials, carbon nanotubes (CNTs) exhibit excellent electrical and mechanical properties, and structurally fabricated CNT-based fibers and yarns with coil and twist further introduce flexible and stretchable properties. A number of notable studies have demonstrated various functions of CNT yarns, including sensors, actuators, and energy storage. In particular, CNT yarns can operate as flexible electronic sensors and electrodes to monitor strain, temperature, ionic concentration, and the concentration of target biomolecules. Moreover, a twisted CNT yarn enables strong torsional actuation, and coiled CNT yarns generate large tensile strokes as an artificial muscle. Furthermore, the reversible actuation of CNT yarns can be used as an energy harvester and, when combined with a CNT supercapacitor, has promoted the next-generation of energy storage systems. Here, progressive advances of CNT yarns in electrical sensing, actuation, and energy storage are reported, and the future challenges in smart electronic systems considered

    Biomass-derived carbons for sodium-ion batteries and sodium-ion capacitors

    Get PDF
    In the past decade, the rapid development of portable electronic devices, electric vehicles, and electrical devices has stimulated extensive interest in fundamental research and the commercialization of electrochemical energy-storage systems. Biomass-derived carbon has garnered significant research attention as an efficient, inexpensive, and eco-friendly active material for energy-storage systems. Therefore, high-performance carbonaceous materials, derived from renewable sources, have been utilized as electrode materials in sodium-ion batteries and sodium-ion capacitors. Herein, the charge-storage mechanism and utilization of biomass-derived carbon for sodium storage in batteries and capacitors are summarized. In particular, the structure–performance relationship of biomass-derived carbon for sodium storage in the form of batteries and capacitors is discussed. Despite the fact that further research is required to optimize the process and application of biomass-derived carbon in energy-storage devices, the current review demonstrates the potential of carbonaceous materials for next-generation sodium-related energy-storage applications.</p

    CAMMD: Context Aware Mobile Medical Devices

    Get PDF
    Telemedicine applications on a medical practitioners mobile device should be context-aware. This can vastly improve the effectiveness of mobile applications and is a step towards realising the vision of a ubiquitous telemedicine environment. The nomadic nature of a medical practitioner emphasises location, activity and time as key context-aware elements. An intelligent middleware is needed to effectively interpret and exploit these contextual elements. This paper proposes an agent-based architectural solution called Context-Aware Mobile Medical Devices (CAMMD). This framework can proactively communicate patient records to a portable device based upon the active context of its medical practitioner. An expert system is utilised to cross-reference the context-aware data of location and time against a practitioners work schedule. This proactive distribution of medical data enhances the usability and portability of mobile medical devices. The proposed methodology alleviates constraints on memory storage and enhances user interaction with the handheld device. The framework also improves utilisation of network bandwidth resources. An experimental prototype is presented highlighting the potential of this approach

    Model for cryptography protection of confidential information

    Get PDF
    УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації. Розглянуто використання засобів криптографічного захисту інформації з метою реалізації організаційних та технічних заходів по запобіганню витокам конфіденційної інформації на об’єктах критичної інфраструктури. Сформульовані базові вимоги та рекомендації щодо структури та функціональних складових моделі захисту конфіденційної інформації. Формалізовані вимоги щодо створення, впровадження та експлуатації превентивних процедур управління багатоступінчатим захистом конфіденційної інформації. Наведено приклад використання моделі криптографічного захисту інформації для створення захищеної і прозорої в використанні бази аутентифікаційних даних користувача. Запропонована модель захисту дозволяє мати кілька ступенів програмного та апаратного захисту, що із однієї сторони спрощує їх використання при виконанні чинних політик безпеки і зменшує ймовірність дискредитації аутентифікаційних даних, а із іншої сторони підвищує ймовірність виявлення зловмисних дій третьої сторони за рахунок багатоступінчатої системи захисту. Враховано практичний досвід створення типових моделей захисту конфіденційної інформації для розробки, впровадження та управління сучасними політиками інформаційної безпеки щодо питань використання засобів криптографічного захисту конфіденційної інформації на підприємствах різних форми власності.UDC 004.056 Borsukovskyi Y., Borsukovska V. Model for Cryptography Protection of Confidential Information Current article provides the detailed analysis of requirements for creation of model for cryptography protection of confidential information. Article defines the use of information cryptography protection tools in order to ensure the application of organizational and technical actions to prevent leakage of confidential information at critical infrastructure assets. It provides the basic requirements for the structure and functional elements of model for protection of confidential information. Formalize requirements on creation, implementation and exploitation of preventive procedure in management of multi-level protection of confidential information. The article includes example of use of model for cryptography protection of information for creation of secure and transparent in use the authenticating data base of user. The presented model of protection ensures to have a few levels of firewalls, that, on one hand, simplifies its use in execution of acting security policies and decrease the probability of discrediting of authenticating data, and, on other hand, increase the probability to detect the criminal actions of third party by means of multi-level protection system. It considers the practical experience in creation of standard models for protection of confidential information for development, implementation and management of modern policies on information security in part of use of cryptography protection tools for confidential information at enterprises of different forms of incorporation

    Carbon Nanotube-Polymer Composites for Energy Storage Applications

    Get PDF
    Renewable energy has attracted growing attention due to energy crisis and environmental concern. The renewable power is featured by its intermittent and fluctuating nature, which requires large-scale electrical energy storage devices for dispatch and integration. Among the current energy storage technologies (e.g., pumped hydro, fly-wheel, compressed air, superconducting magnet, electrochemical systems), electrochemical storage technologies or batteries that reversely convert electrical energy into chemical energy demonstrate extremely great potential in the stationary and transportation applications. Scale determines the device type. Redox flow batteries (RFBs), as one of the large-scale types, are capable of complying with power station. Meanwhile, portable smart electronic devices promote the development of small-scale energy storage systems, such as Li-ion batteries and supercapacitors. With delicate device configuration, materials play critical roles on pursuing advancing performance, in terms of electrode, current collector, and separator. Carbon nanotube (CNT)/polymer composites exhibit promising potentials in the above key entities, which integrate the merits of conductivity, mechanical strength, flexibility, and cost. Therefore, this chapter is devoted to the design and application of carbon nanotube/polymer composites in different kinds of energy storage systems

    A portable potentiometric electronic tongue leveraging smartphone and cloud platforms

    Full text link
    Electronic tongues based on potentiometry offer the prospect of rapid and continuous chemical fingerprinting for portable and remote systems. The present contribution presents a technology platform including a miniaturized electronic tongue based on electropolymerized ion-sensitive films, microcontroller-based data acquisition, a smartphone interface and cloud computing back-end for data storage and deployment of machine learning models. The sensor array records a series of differential voltages without use of a true reference electrode and the resulting time-series potentiometry data is used to train supervised machine learning algorithms. For trained systems, inferencing tasks such as the classification of liquids are realized within less than 1 minute including data acquisition at the edge and inference using the cloud-deployed machine learning model. Preliminary demonstration of the complete electronic tongue technology stack is reported for the classification of beverages and mineral water.Comment: 2019 ISOCS/IEEE International Symposium on Olfaction and Electronic Nose (ISOEN

    The system architecture of the Pocket Companion

    Get PDF
    In the Moby Dick project we design the architecture of a so-called Pocket Companion. It is a small personal portable computer with wireless communication facilities for every day use. The typical use of the Pocket Companion induces a number of requirements concerning security, performance, energy consumption, communication and size. We have shown that these requirements are interrelated and can only be met optimal with one single architecture. The Pocket Companion architecture consists of a central switch with a security module surrounded by several modules. The Pocket Companion is a personal machine. Communication, and particularly wireless communication, is essential for the system to support electronic transactions. Such a system requires a good security infrastructure not only for safeguarding personal data, but also to allow safe (financial) transactions. The integration of a security module in the Pocket Companion architecture provides the basis for a secure environment.\ud Because battery life is limited and battery weight is an important factor for the size and the weight of the Pocket Companion, energy consumption plays a crucial role in the architecture. An important theme of the architecture is: enough performance for minimal energy consumption

    Demonstrating the feasibility of standardized application program interfaces that will allow mobile/portable terminals to receive services combining UMTS and DVB-T

    Get PDF
    Crucial to the commercial exploitation of any service combining UMTS and DVB-T is the availability of standardized API’s adapted to the hybrid UMTS and DVB-T network and to the technical limitations of mobile/portable terminals. This paper describes work carried out in the European Commission Framework Program 5 (FP5) project CONFLUENT to demonstrate the feasibility of such Application Program Interfaces (API’s) by enabling the reception of a Multimedia Home Platform (MHP) based application transmitted over DVB-T on five different terminals with parts of the service running on a mobile phone
    corecore