975 research outputs found

    Thermomechanical surface instability at the origin of surface fissure patterns on heated circular MDF samples

    Full text link
    When a flat sample of medium density fibreboard (MDF) is exposed to radiant heat in an inert atmosphere, primary crack patterns suddenly start to appear over the entire surface before pyrolysis and any charring occurs. Contrary to common belief that crack formation is due to drying and shrinkage, it was demonstrated for square samples that this results from thermomechanical instability. In the present paper, new experimental data are presented for circular samples of the same MDF material. The sample was exposed to radiant heating at 20 or 50 kW/m2, and completely different crack patterns with independent Eigenmodes were observed at the two heat fluxes. We show that the two patterns can be reproduced with a full 3-D thermomechanical surface instability model of a hot layer adhered to an elastic colder foundation in an axisymmetric domain. Analytical and numerical solutions of a simplified 2-D formulation of the same problem provide excellent qualitative agreement between observed and calculated patterns. Previous data for square samples together with the results reported in the present paper for circular samples confirm the validity of the model for qualitative predictions, and indicate that further refinements can be made to improve its quantitative predictive capability.Comment: 9 pages, 13 figures. New title and abstract, added experimental and simulation details and figures, conclusions unchanged. Matches the version published in Fire And Material

    The Dishwasher

    Get PDF
    The Dishwasher is a 2D animated thesis film that lasts 5 minutes and 27 seconds. This animated short film shows a story of a young man, Kai, who dreams of becoming an artist in the US; however, he has to wash dishes for his living. One day, the dish machine is out of control because of Kai’s careless mistake. The manager sees the situation and begins to blame Kai. While the manager yells at him, Kai notices a funny animation loop appearing on the spinning dishes, which makes him laugh. After the manager leaves, Kai looks at his face reflected in the window of the dish machine and it reminds him of the old times when he learned drawing at art school. This coincidental memory sparks Kai’s passion for making art on the plates. Then, he starts to dance and decides to treat his job differently

    Method of on road vehicle tracking

    Get PDF

    The Scaling of Human Contacts in Reaction-Diffusion Processes on Heterogeneous Metapopulation Networks

    Full text link
    We present new empirical evidence, based on millions of interactions on Twitter, confirming that human contacts scale with population sizes. We integrate such observations into a reaction-diffusion metapopulation framework providing an analytical expression for the global invasion threshold of a contagion process. Remarkably, the scaling of human contacts is found to facilitate the spreading dynamics. Our results show that the scaling properties of human interactions can significantly affect dynamical processes mediated by human contacts such as the spread of diseases, and ideas

    Circuit Techniques for Low-Power and Secure Internet-of-Things Systems

    Full text link
    The coming of Internet of Things (IoT) is expected to connect the physical world to the cyber world through ubiquitous sensors, actuators and computers. The nature of these applications demand long battery life and strong data security. To connect billions of things in the world, the hardware platform for IoT systems must be optimized towards low power consumption, high energy efficiency and low cost. With these constraints, the security of IoT systems become a even more difficult problem compared to that of computer systems. A new holistic system design considering both hardware and software implementations is demanded to face these new challenges. In this work, highly robust and low-cost true random number generators (TRNGs) and physically unclonable functions (PUFs) are designed and implemented as security primitives for secret key management in IoT systems. They provide three critical functions for crypto systems including runtime secret key generation, secure key storage and lightweight device authentication. To achieve robustness and simplicity, the concept of frequency collapse in multi-mode oscillator is proposed, which can effectively amplify the desired random variable in CMOS devices (i.e. process variation or noise) and provide a runtime monitor of the output quality. A TRNG with self-tuning loop to achieve robust operation across -40 to 120 degree Celsius and 0.6 to 1V variations, a TRNG that can be fully synthesized with only standard cells and commercial placement and routing tools, and a PUF with runtime filtering to achieve robust authentication, are designed based upon this concept and verified in several CMOS technology nodes. In addition, a 2-transistor sub-threshold amplifier based "weak" PUF is also presented for chip identification and key storage. This PUF achieves state-of-the-art 1.65% native unstable bit, 1.5fJ per bit energy efficiency, and 3.16% flipping bits across -40 to 120 degree Celsius range at the same time, while occupying only 553 feature size square area in 180nm CMOS. Secondly, the potential security threats of hardware Trojan is investigated and a new Trojan attack using analog behavior of digital processors is proposed as the first stealthy and controllable fabrication-time hardware attack. Hardware Trojan is an emerging concern about globalization of semiconductor supply chain, which can result in catastrophic attacks that are extremely difficult to find and protect against. Hardware Trojans proposed in previous works are based on either design-time code injection to hardware description language or fabrication-time modification of processing steps. There have been defenses developed for both types of attacks. A third type of attack that combines the benefits of logical stealthy and controllability in design-time attacks and physical "invisibility" is proposed in this work that crosses the analog and digital domains. The attack eludes activation by a diverse set of benchmarks and evades known defenses. Lastly, in addition to security-related circuits, physical sensors are also studied as fundamental building blocks of IoT systems in this work. Temperature sensing is one of the most desired functions for a wide range of IoT applications. A sub-threshold oscillator based digital temperature sensor utilizing the exponential temperature dependence of sub-threshold current is proposed and implemented. In 180nm CMOS, it achieves 0.22/0.19K inaccuracy and 73mK noise-limited resolution with only 8865 square micrometer additional area and 75nW extra power consumption to an existing IoT system.PHDElectrical EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/138779/1/kaiyuan_1.pd

    Privacy-Preserving Detection Method for Transmission Line Based on Edge Collaboration

    Full text link
    Unmanned aerial vehicles (UAVs) are commonly used for edge collaborative computing in current transmission line object detection, where computationally intensive tasks generated by user nodes are offloaded to more powerful edge servers for processing. However, performing edge collaborative processing on transmission line image data may result in serious privacy breaches. To address this issue, we propose a secure single-stage detection model called SecYOLOv7 that preserves the privacy of object detecting. Based on secure multi-party computation (MPC), a series of secure computing protocols are designed for the collaborative execution of Secure Feature Contraction, Secure Bounding-Box Prediction and Secure Object Classification by two non-edge servers. Performance evaluation shows that both computational and communication overhead in this framework as well as calculation error significantly outperform existing works
    • …
    corecore