44,526 research outputs found
Recommended from our members
Silver as a constraint for a large-scale development of solar photovoltaics? Scenario-making to the year 2050 supported by expert engagement and global sensitivity analysis
In this study we assess whether availability of silver could constrain a large-scale deployment of solar photovoltaics (PV). While silver-paste use in photovoltaics cell metallization is becoming more efficient, solar photovoltaics power capacity installation is growing at an exponential pace. Along photovoltaics, silver is also employed in an array of industrial and non-industrial applications. The trends of these uses are examined up to the year 2050. The technical coefficients for the expansion in photovoltaics power capacity and contraction in silver paste use have been assessed through an expert-consultation process. The trend of use in the non-PV sectors has been estimated through an ARIMA (auto-regressive integrated moving average) model. The yearly and cumulative silver demand are evaluated against the technological potential for increasing silver mining and the estimates of its global natural availability, respectively. The model implemented is tested with a quasi-random Monte Carlo variance-based global sensitivity analysis. The result of our inquiry is that silver may not represent a constraint for a very-large-scale deployment of photovoltaics (up to tens TW in installed power capacity) provided the present decreasing trend in the use of silver paste in the photovoltaics sector continues at an adequate pace. Silver use in non-photovoltaic sectors plays also a tangible influence on potential constraints. In terms of natural constraints, most of the uncertainty is dependent on the actual estimates of silver natural budget
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
Review of analytical instruments for EEG analysis
Since it was first used in 1926, EEG has been one of the most useful
instruments of neuroscience. In order to start using EEG data we need not only
EEG apparatus, but also some analytical tools and skills to understand what our
data mean. This article describes several classical analytical tools and also
new one which appeared only several years ago. We hope it will be useful for
those researchers who have only started working in the field of cognitive EEG
- …