362 research outputs found

    Impact of built-in fields and contact configuration on the characteristics of ultra-thin GaAs solar cells

    Full text link
    We discuss the effects of built-in fields and contact configuration on the photovoltaic characteristics of ultrathin GaAs solar cells. The investigation is based on advanced quantum-kinetic simulations reaching beyond the standard semi-classical bulk picture concerning the consideration of charge carrier states and dynamics in complex potential profiles. The thickness dependence of dark and photocurrent in the ultra-scaled regime is related to the corresponding variation of both, the built-in electric fields and associated modification of the density of states, and the optical intensity in the films. Losses in open-circuit voltage and short-circuit current due to leakage of electronically and optically injected carriers at minority carrier contacts are investigated for different contact configurations including electron and hole blocking barrier layers. The microscopic picture of leakage currents is connected to the effect of finite surface recombination velocities in the semi-classical description, and the impact of these non-classical contact regions on carrier generation and extraction is analyzed.Comment: 5 pages, 8 figure

    Network traffic analysis for threats detection in the Internet of Things

    Get PDF
    As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Users cannot be expected to tackle this threat alone, and many current solutions available for network monitoring are simply not accessible or can be difficult to implement for the average user, which is a gap that needs to be addressed. This article presents an effective signature-based solution to monitor, analyze, and detect potentially malicious traffic for IoT ecosystems in the typical home network environment by utilizing passive network sniffing techniques and a cloud application to monitor anomalous activity. The proposed solution focuses on two attack and propagation vectors leveraged by the infamous Mirai botnet, namely DNS and Telnet. Experimental evaluation demonstrates the proposed solution can detect 98.35 percent of malicious DNS traffic and 99.33 percent of Telnet traffic for an overall detection accuracy of 98.84 percent

    Outdoor performance of a thin-film gallium-arsenide photovoltaic module

    Get PDF
    We deployed a 855 cm2 thin-film, single-junction gallium arsenide (GaAs) photovoltaic (PV) module outdoors. Due to its fundamentally different cell technology compared to silicon (Si), the module responds differently to outdoor conditions. On average during the test, the GaAs module produced more power when its temperature was higher. We show that its maximum-power temperature coefficient, while actually negative, is several times smaller in magnitude than that of a Si module used for comparison. The positive correlation of power with temperature in GaAs is due to temperature-correlated changes in the incident spectrum. We show that a simple correction based on precipitable water vapor (PWV) brings the photocurrent temperature coefficient into agreement with that measured by other methods and predicted by theory. The low operating temperature and small temperature coefficient of GaAs give it an energy production advantage in warm weather

    A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases

    Get PDF
    This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-oriented modelling at high levels of abstraction where fundamental SOA theories and techniques are fully integrated into a practical software engineering approach. 3SOA abstracts the dependencies of the middleware programming model from the application logic. This abstraction allows the development efforts to focus on writing the application logic independently from hardware platforms, middleware, and languages in which applications are programmed. To achieve this result, IoT objects are treated as independent entities that may interact with each other using a well-defined message exchange sequence. Each object is defined by the services it provides and the coordination protocol it supports. Objects are then able to coordinate their resources to address the global objectives of the system. To practically validate our proposals, we demonstrate an intelligent transportation system and data privacy functional prototypes as proof of concepts. The use cases show that 3SOA and the presented abstraction language allow the amalgamation of macroprogramming and node-centric programming to develop real-time and efficient applications over IoT

    Network Traffic Analysis for Threats Detection in the Internet of Things

    Get PDF
    As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Whilst users can not be expected to tackle this threat alone, many current solutions available for network monitoring are simply not accessible or can be difficult to implement for the average user and is a gap that needs to be addressed. This paper presents an effective signature-based solution to monitor, analyse and detect potentially malicious traffic for IoT ecosystems in the typical home network environment by utilising passive network sniffing techniques and a cloud-application to monitor anomalous activity. The proposed solution focuses on two attack and propagation vectors leveraged by the infamous Mirai botnet, namely DNS and Telnet. Experimental evaluation demonstrates the proposed solution can detect 98.35% of malicious DNS traffic and 99.33% of Telnet traffic respectively; for an overall detection accuracy of 98.84%

    Comparison of rapid tests for detection of rifampicin-resistant Mycobacterium tuberculosis in Kampala, Uganda

    Get PDF
    BACKGROUND: Drug resistant tuberculosis (TB) is a growing concern worldwide. Rapid detection of resistance expedites appropriate intervention to control the disease. Several technologies have recently been reported to detect rifampicin resistant Mycobacterium tuberculosis directly in sputum samples. These include phenotypic culture based methods, tests for gene mutations and tests based on bacteriophage replication. The aim of the present study was to assess the feasibility of implementing technology for rapid detection of rifampicin resistance in a high disease burden setting in Africa. METHODS: Sputum specimens from re-treatment TB patients presenting to the Mulago Hospital National TB Treatment Centre in Kampala, Uganda, were examined by conventional methods and simultaneously used in one of the four direct susceptibility tests, namely direct BACTEC 460, Etest, "in-house" phage test, and INNO- Rif.TB. The reference method was the BACTEC 460 indirect culture drug susceptibility testing. Test performance, cost and turn around times were assessed. RESULTS: In comparison with indirect BACTEC 460, the respective sensitivities and specificities for detecting rifampicin resistance were 100% and 100% for direct BACTEC and the Etest, 94% and 95% for the phage test, and 87% and 87% for the Inno-LiPA assay. Turn around times ranged from an average of 3 days for the INNO-LiPA and phage tests, 8 days for the direct BACTEC 460 and 20 days for the Etest. All methods were faster than the indirect BACTEC 460 which had a mean turn around time of 24 days. The cost per test, including labour ranged from 18.60to18.60 to 41.92 (USD). CONCLUSION: All four rapid technologies were shown capable of detecting rifampicin resistance directly from sputum. The LiPA proved rapid, but was the most expensive. It was noted, however, that the LiPA test allows sterilization of samples prior to testing thereby reducing the risk of accidental laboratory transmission. In contrast the Etest was low cost, but slow and would be of limited assistance when treating patients. The phage test was the least reproducible test studied with failure rate of 27%. The test preferred by the laboratory personnel, direct BACTEC 460, requires further study to determine its accuracy in real-time treatment decisions in Uganda
    • …
    corecore