207 research outputs found

    ΛNN\Lambda NN and ΣNN\Sigma NN systems at threshold: II. The effect of D waves

    Get PDF
    Using the two-body interactions obtained from a chiral constituent quark model we study all ΛNN\Lambda NN and ΣNN\Sigma NN states with I=0,1,2 and J=1/2,3/2 at threshold, taking into account all three-body configurations with S and D wave components. We constrain further the limits for the ΛN\Lambda N spin-triplet scattering length a_{1/2,1}. Using the hypertriton binding energy we find a narrow interval for the possible values of the ΛN\Lambda N spin-singlet scattering length a_{1/2,0}. We found that the ΣNN\Sigma NN system has a quasibound state in the (I,J) = (1,1/2) channel very near threshold with a width of about 2.1 MeV.Comment: 19 pages, 4 tables, 6 figures. Accepted for publication in Phys. Rev.

    Too many X′sX's, Y′sY's and Z′sZ's?

    Get PDF
    A large number of new states have been reported during the last few years in charmonium spectroscopy above the charmed meson production threshold. They have been called X′sX's, Y′sY's, and Z′sZ's. We reflect on the influence of thresholds on heavy meson spectroscopy comparing different flavor sectors and quantum numbers. The validity of a quark-model picture above open-flavor thresholds would severely restrict the number of channels that may lodge meson-meson molecules.Comment: 8 pages, 5 figure

    Towards the internet of smart clothing: a review on IoT wearables and garments for creating intelligent connected e-textiles

    Get PDF
    [Abstract] Technology has become ubiquitous, it is all around us and is becoming part of us. Togetherwith the rise of the Internet of Things (IoT) paradigm and enabling technologies (e.g., Augmented Reality (AR), Cyber-Physical Systems, Artificial Intelligence (AI), blockchain or edge computing), smart wearables and IoT-based garments can potentially have a lot of influence by harmonizing functionality and the delight created by fashion. Thus, smart clothes look for a balance among fashion, engineering, interaction, user experience, cybersecurity, design and science to reinvent technologies that can anticipate needs and desires. Nowadays, the rapid convergence of textile and electronics is enabling the seamless and massive integration of sensors into textiles and the development of conductive yarn. The potential of smart fabrics, which can communicate with smartphones to process biometric information such as heart rate, temperature, breathing, stress, movement, acceleration, or even hormone levels, promises a new era for retail. This article reviews the main requirements for developing smart IoT-enabled garments and shows smart clothing potential impact on business models in the medium-term. Specifically, a global IoT architecture is proposed, the main types and components of smart IoT wearables and garments are presented, their main requirements are analyzed and some of the most recent smart clothing applications are studied. In this way, this article reviews the past and present of smart garments in order to provide guidelines for the future developers of a network where garments will be connected like other IoT objects: the Internet of Smart Clothing.Xunta de Galicia; ED431C 2016-045Xunta de Galicia; ED341D R2016/012Xunta de Galicia; ED431G/01Agencia Estatal de Investigación de España; TEC2013-47141-C4-1-RAgencia Estatal de Investigación de España; TEC2016-75067-C4-1-RAgencia Estatal de Investigación de España; TEC2015-69648-RED

    Towards Next Generation Teaching, Learning, and Context-Aware Applications for Higher Education: A Review on Blockchain, IoT, Fog and Edge Computing Enabled Smart Campuses and Universities

    Get PDF
    [Abstract] Smart campuses and smart universities make use of IT infrastructure that is similar to the one required by smart cities, which take advantage of Internet of Things (IoT) and cloud computing solutions to monitor and actuate on the multiple systems of a university. As a consequence, smart campuses and universities need to provide connectivity to IoT nodes and gateways, and deploy architectures that allow for offering not only a good communications range through the latest wireless and wired technologies, but also reduced energy consumption to maximize IoT node battery life. In addition, such architectures have to consider the use of technologies like blockchain, which are able to deliver accountability, transparency, cyber-security and redundancy to the processes and data managed by a university. This article reviews the state of the start on the application of the latest key technologies for the development of smart campuses and universities. After defining the essential characteristics of a smart campus/university, the latest communications architectures and technologies are detailed and the most relevant smart campus deployments are analyzed. Moreover, the use of blockchain in higher education applications is studied. Therefore, this article provides useful guidelines to the university planners, IoT vendors and developers that will be responsible for creating the next generation of smart campuses and universities.Xunta de Galicia; ED431C 2016-045Xunta de Galicia; ED431G/01Agencia Estatal de Investigación de España; TEC2016-75067-C4-1-

    Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era

    Get PDF
    [Abstract] Industry 4.0 and Industrial Internet of Things (IIoT) are paradigms that are driving current industrial revolution by connecting to the Internet industrial machinery, management tools or products so as to control and gather data about them. The problem is that many IIoT/Industry 4.0 devices have been connected to the Internet without considering the implementation of proper security measures, thus existing many examples of misconfigured or weakly protected devices. Securing such systems requires very specific skills, which, unfortunately, are not taught extensively in engineering schools. This article details how Industry 4.0 and IIoT cybersecurity can be learned through practical use cases, making use of a methodology that allows for carrying out audits to students that have no previous experience in IIoT or industrial cybersecurity. The described teaching approach is blended and has been imparted at the University of A Coruña (Spain) during the last years, even during the first semester of 2020, when the university was closed due to the COVID-19 pandemic lockdown. Such an approach is supported by online tools like Shodan, which ease the detection of vulnerable IIoT devices. The feedback results provided by the students show that they consider useful the proposed methodology, which allowed them to find that 13% of the IIoT/Industry 4.0 systems they analyzed could be accessed really easily. In addition, the obtained teaching results indicate that the established course learning outcomes are accomplished. Therefore, this article provides useful guidelines for teaching industrial cybersecurity and thus train the next generation of security researchers and developers.This work has been funded by the Xunta de Galicia (ED431G 2019/01), the Agencia Estatal de Investigación of Spain (TEC2016-75067-C4-1-R, RED2018-102668-T, PID2019-104958RB-C42) and ERDF funds of the EU (AEI/FEDER, UE)Xunta de Galicia; ED431G 2019/0

    Design of a Fog Computing, Blockchain and IoT-Based Continuous Glucose Monitoring System for Crowdsourcing mHealth

    Get PDF
    [Abstract] Diabetes Mellitus, usually called only Diabetes, is a worldwide chronic metabolic disorder that is characterized by abnormal oscillations in blood sugar levels. Such levels should be monitored by diabetes patients, which traditionally have had to take blood samples by finger-pricking, at least between twice and four times a day. Finger-pricking has a number of drawbacks that can be tackled by Continuous Glucose Monitors (CGMs), which are able to determine blood sugar levels throughout the day and not only at specific time instants. In this paper, the design of an IoT CGM-based system is proposed, whose collected blood sugar sample values can be accessed remotely; thus being able to monitor patients, specifically dependent ones (e.g., children, elders, and pregnant women) and warn them in the case where a dangerous situation is detected. In order to create such a system, a fog computing system, based on distributed mobile smart phones, has been devised to collect data from the CGMs. Moreover, the use of a blockchain is proposed, to receive, validate, and store the collected data with the objective of avoiding untrusted sources and, thus, to provide a transparent and trustworthy data source of a population, which can vary in age, ethnicity, psychology, education, self-care, and/or geographic location, in a rapid, flexible, scalable, and low-cost way. These crowdsourced data can enable novel mHealth applications for diagnosis, patient monitoring, or even public health actions, which can help to advance in the control of the disease and raise global awareness on the increasing prevalence of diabetes.Xunta de Galicia; ED431C 2016-045Xunta de Galicia; ED431G/01Agencia Estatal de Investigación de España; TEC2016-75067-C4-1-

    Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

    Get PDF
    [Abstract] Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. In the case of blockchain, such characteristics are provided through public-key cryptography and hash functions. However, the fast progress of quantum computing has opened the possibility of performing attacks based on Grover's and Shor's algorithms in the near future. Such algorithms threaten both public-key cryptography and hash functions, forcing to redesign blockchains to make use of cryptosystems that withstand quantum attacks, thus creating which are known as post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. For such a purpose, this article first studies current state of the art on post-quantum cryptosystems and how they can be applied to blockchains and DLTs. Moreover, the most relevant post-quantum blockchain systems are studied, as well as their main challenges. Furthermore, extensive comparisons are provided on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains. Thus, this article seeks to provide a broad view and useful guidelines on post-quantum blockchain security to future blockchain researchers and developers.10.13039/501100010801-Xunta de Galicia (Grant Number: ED431G2019/01) 10.13039/501100011033-Agencia Estatal de Investigación (Grant Number: TEC2016-75067-C4-1-R and RED2018-102668-T) 10.13039/501100008530-European Regional Development FundXunta de Galicia; ED431G2019/0
    • …
    corecore