Letteratura scientifica selezionata sul tema "Ids and devices"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Ids and devices".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Ids and devices"

1

Naz, Naila, Muazzam A. Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan e Jawad Ahmad. "Ensemble learning-based IDS for sensors telemetry data in IoT networks". Mathematical Biosciences and Engineering 19, n. 10 (2022): 10550–80. http://dx.doi.org/10.3934/mbe.2022493.

Testo completo
Abstract (sommario):
<abstract><p>The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with other devices using different communication protocols such as CoAP, MQTT, DDS, etc. Study shows that these protocols are vulnerable to attack and prove a significant threat to IoT telemetry data. Within a network, IoT devices are interdependent, and the behaviour of one device depends on the data coming from another device. An intruder exploits vulnerabilities of a device's interdependent feature and can alter the telemetry data to indirectly control the behaviour of other dependent devices in a network. Therefore, securing IoT devices have become a significant concern in IoT networks. The research community often proposes intrusion Detection Systems (IDS) using different techniques. One of the most adopted techniques is machine learning (ML) based intrusion detection. This study suggests a stacking-based ensemble model makes IoT devices more intelligent for detecting unusual behaviour in IoT networks. The TON-IoT (2020) dataset is used to assess the effectiveness of the proposed model. The proposed model achieves significant improvements in accuracy and other evaluation measures in binary and multi-class classification scenarios for most of the sensors compared to traditional ML algorithms and other ensemble techniques.</p></abstract>
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Dat-Thinh, Nguyen, Ho Xuan-Ninh e Le Kim-Hung. "MidSiot: A Multistage Intrusion Detection System for Internet of Things". Wireless Communications and Mobile Computing 2022 (21 febbraio 2022): 1–15. http://dx.doi.org/10.1155/2022/9173291.

Testo completo
Abstract (sommario):
Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Gluskin, Efim. "APS Insertion Devices: Recent Developments and Results". Journal of Synchrotron Radiation 5, n. 3 (1 maggio 1998): 189–95. http://dx.doi.org/10.1107/s0909049597013769.

Testo completo
Abstract (sommario):
The Advanced Photon Source (APS) now has a total of 23 insertion devices (IDs). Over two-thirds of them are installed on the storage ring. The installed devices include 18, 27 and 55 mm-period undulators; an 85 mm-period wiggler; a 16 cm-period elliptical multipole wiggler; and many 33 mm-period undulators. Most of the IDs occupy storage-ring straight sections equipped with 8 mm vertical-aperture vacuum chambers. All of the IDs were measured magnetically at the APS and, in most cases, underwent a final magnetic tuning in order to minimize variation in the various integrals of the field through the ID over the full gap range. Special shimming techniques to correct magnetic field parameters in appropriate gap-dependent ways were developed and applied. Measurements of the closed-orbit distortion as a function of the ID gap variation have been completed, and results are in a good agreement with magnetic measurements. Spectral diagnostics of the ID radiation, including measurements of the absolute spectral flux, brilliance and polarization, show excellent agreement between calculated and measured results. Studies of the sensitivity of IDs to radiation exposure and measurements of the dose rate received by the IDs are in progress.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Matebesi, Unopa, e Nonofo M. J. Ditshego. "Indium Gallium Zinc Oxide FinFET Compared with Silicon FinFET". Journal of Nano Research 68 (29 giugno 2021): 103–13. http://dx.doi.org/10.4028/www.scientific.net/jnanor.68.103.

Testo completo
Abstract (sommario):
Indium gallium zinc oxide fin-field effect transistor (IGZO FinFET) characteristics are investigated and then compared with Zinc oxide fin-field effect transistor (ZnO FinFET) and the Silicon fin-field effect transistor (Si FinFET). This was done using 3D simulation. The threshold voltage for Si, ZnO, and IGZO is 0.75 V, 0.30 V and 0.05 V respectively. The silicon device has the highest transconductance (5.0 x 10-7 S) and performs better than the other devices because it has less fixed charge defects. IGZO has the second-best value of Gm (3.6 x 10-7 S), ZnO has the least value of Gm (3.4 x 10-7 S). Si device has the least drain current (IDS) value of 2.0 x 10-7 A, ZnO device has a better IDS value of 6.2 x 10-6 A while IGZO device has the best IDS value of 1.6 x 10-5 A. IGZO is better than Si by two (2) order magnitude. The field effect mobility is 50.0 cm2/Vs for all three devices.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Levichev, Eugene, e Nikolay Vinokurov. "Undulators and Other Insertion Devices". Reviews of Accelerator Science and Technology 03, n. 01 (gennaio 2010): 203–20. http://dx.doi.org/10.1142/s1793626810000403.

Testo completo
Abstract (sommario):
This article reviews insertion devices (IDs) — wigglers and undulators — both for synchrotron radiation production and for machine parameter control. As there are many types of wigglers and undulators and it is impossible to describe them all in detail, here we particularly emphasize the design, characteristics and tolerances of undulators for free electron lasers and damping wigglers for controlling beam damping parameters. The influence of periodic IDs on beam parameters in cyclic accelerators is described in brief. A profound description of different ID types can be found in [1].
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Cortese, Yvonne J., Victoria E. Wagner, Morgan Tierney, Declan Devine e Andrew Fogarty. "Review of Catheter-Associated Urinary Tract Infections and In Vitro Urinary Tract Models". Journal of Healthcare Engineering 2018 (14 ottobre 2018): 1–16. http://dx.doi.org/10.1155/2018/2986742.

Testo completo
Abstract (sommario):
Catheter-associated urinary tract infections (CAUTIs) are one of the most common nosocomial infections and can lead to numerous medical complications from the mild catheter encrustation and bladder stones to the severe septicaemia, endotoxic shock, and pyelonephritis. Catheters are one of the most commonly used medical devices in the world and can be characterised as either indwelling (ID) or intermittent catheters (IC). The primary challenges in the use of IDs are biofilm formation and encrustation. ICs are increasingly seen as a solution to the complications caused by IDs as ICs pose no risk of biofilm formation due to their short time in the body and a lower risk of bladder stone formation. Research on IDs has focused on the use of antimicrobial and antibiofilm compounds, while research on ICs has focused on preventing bacteria entering the urinary tract or coming into contact with the catheter. There is an urgent need for in vitro urinary tract models to facilitate faster research and development for CAUTI prevention. There are currently three urinary tract models that test IDs; however, there is only a single very limited model for testing ICs. There is currently no standardised urinary tract model to test the efficacies of ICs.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

R. Zarzoor, Ahmed, Nadia Adnan Shiltagh Al-Jamali e Dina A. Abdul Qader. "Intrusion detection method for internet of things based on the spiking neural network and decision tree method". International Journal of Electrical and Computer Engineering (IJECE) 13, n. 2 (1 aprile 2023): 2278. http://dx.doi.org/10.11591/ijece.v13i2.pp2278-2288.

Testo completo
Abstract (sommario):
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices’ power usage. Also, a rand order code (ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS-SNNTLF by using three performance metrics: detection accuracy, latency, and energy usage. The simulation results have shown that IDS-SNNDT attained low power usage and less latency in comparison with IDS-DNN and IDS-SNNTLF methods. Also, IDS-SNNDT has achieved high detection accuracy for cyber-attacks in contrast with IDS-SNNTLF.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Kimbrough, Joevonte, Lauren Williams, Qunying Yuan e Zhigang Xiao. "Dielectrophoresis-Based Positioning of Carbon Nanotubes for Wafer-Scale Fabrication of Carbon Nanotube Devices". Micromachines 12, n. 1 (25 dicembre 2020): 12. http://dx.doi.org/10.3390/mi12010012.

Testo completo
Abstract (sommario):
In this paper, we report the wafer-scale fabrication of carbon nanotube field-effect transistors (CNTFETs) with the dielectrophoresis (DEP) method. Semiconducting carbon nanotubes (CNTs) were positioned as the active channel material in the fabrication of carbon nanotube field-effect transistors (CNTFETs) with dielectrophoresis (DEP). The drain-source current (IDS) was measured as a function of the drain-source voltage (VDS) and gate-source voltage (VGS) from each CNTFET on the fabricated wafer. The IDS on/off ratio was derived for each CNTFET. It was found that 87% of the fabricated CNTFETs was functional, and that among the functional CNTFETs, 30% of the CNTFETs had an IDS on/off ratio larger than 20 while 70% of the CNTFETs had an IDS on/off ratio lower than 20. The highest IDS on/off ratio was about 490. The DEP-based positioning of carbon nanotubes is simple and effective, and the DEP-based device fabrication steps are compatible with Si technology processes and could lead to the wafer-scale fabrication of CNT electronic devices.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Alsharif, Maram, e Danda B. Rawat. "Study of Machine Learning for Cloud Assisted IoT Security as a Service". Sensors 21, n. 4 (3 febbraio 2021): 1034. http://dx.doi.org/10.3390/s21041034.

Testo completo
Abstract (sommario):
Machine learning (ML) has been emerging as a viable solution for intrusion detection systems (IDS) to secure IoT devices against different types of attacks. ML based IDS (ML-IDS) normally detect network traffic anomalies caused by known attacks as well as newly introduced attacks. Recent research focuses on the functionality metrics of ML techniques, depicting their prediction effectiveness, but overlooked their operational requirements. ML techniques are resource-demanding that require careful adaptation to fit the limited computing resources of a large sector of their operational platform, namely, embedded systems. In this paper, we propose cloud-based service architecture for managing ML models that best fit different IoT device operational configurations for security. An IoT device may benefit from such a service by offloading to the cloud heavy-weight activities such as feature selection, model building, training, and validation, thus reducing its IDS maintenance workload at the IoT device and get the security model back from the cloud as a service.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Javed, Abbas, Amna Ehtsham, Muhammad Jawad, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi e Hadi Larijani. "Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes". Future Internet 16, n. 6 (5 giugno 2024): 200. http://dx.doi.org/10.3390/fi16060200.

Testo completo
Abstract (sommario):
Smart home devices, also known as IoT devices, provide significant convenience; however, they also present opportunities for attackers to jeopardize homeowners’ security and privacy. Securing these IoT devices is a formidable challenge because of their limited computational resources. Machine learning-based intrusion detection systems (IDSs) have been implemented on the edge and the cloud; however, IDSs have not been embedded in IoT devices. To address this, we propose a novel machine learning-based two-layered IDS for smart home IoT devices, enhancing accuracy and computational efficiency. The first layer of the proposed IDS is deployed on a microcontroller-based smart thermostat, which uploads the data to a website hosted on a cloud server. The second layer of the IDS is deployed on the cloud side for classification of attacks. The proposed IDS can detect the threats with an accuracy of 99.50% at cloud level (multiclassification). For real-time testing, we implemented the Raspberry Pi 4-based adversary to generate a dataset for man-in-the-middle (MITM) and denial of service (DoS) attacks on smart thermostats. The results show that the XGBoost-based IDS detects MITM and DoS attacks in 3.51 ms on a smart thermostat with an accuracy of 97.59%.
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Ids and devices"

1

Li, Fudong. "Behaviour profiling for mobile devices". Thesis, University of Plymouth, 2012. http://hdl.handle.net/10026.1/1025.

Testo completo
Abstract (sommario):
With more than 5 billion users globally, mobile devices have become ubiquitous in our daily life. The modern mobile handheld device is capable of providing many multimedia services through a wide range of applications over multiple networks as well as on the handheld device itself. These services are predominantly driven by data, which is increasingly associated with sensitive information. Such a trend raises the security requirement for reliable and robust verification techniques of users.This thesis explores the end-user verification requirements of mobile devices and proposes a novel Behaviour Profiling security framework for mobile devices. The research starts with a critical review of existing mobile technologies, security threats and mechanisms, and highlights a broad range of weaknesses. Therefore, attention is given to biometric verification techniques which have the ability to offer better security. Despite a large number of biometric works carried out in the area of transparent authentication systems (TAS) and Intrusion Detection Systems (IDS), each have a set of weaknesses that fail to provide a comprehensive solution. They are either reliant upon a specific behaviour to enable the system to function or only capable of providing security for network based services. To this end, the behaviour profiling technique is identified as a potential candidate to provide high level security from both authentication and IDS aspects, operating in a continuous and transparent manner within the mobile host environment.This research examines the feasibility of a behaviour profiling technique through mobile users general applications usage, telephone, text message and multi-instance application usage with the best experimental results Equal Error Rates (EER) of 13.5%, 5.4%, 2.2% and 10% respectively. Based upon this information, a novel architecture of Behaviour Profiling on mobile devices is proposed. The framework is able to provide a robust, continuous and non-intrusive verification mechanism in standalone, TAS or IDS modes, regardless of device hardware configuration. The framework is able to utilise user behaviour to continuously evaluate the system security status of the device. With a high system security level, users are granted with instant access to sensitive services and data, while with lower system security levels, users are required to reassure their identity before accessing sensitive services.The core functions of the novel framework are validated through the implementation of a simulation system. A series of security scenarios are designed to demonstrate the effectiveness of the novel framework to verify legitimate and imposter activities. By employing the smoothing function of three applications, verification time of 3 minutes and a time period of 60 minutes of the degradation function, the Behaviour Profiling framework achieved the best performance with False Rejection Rate (FRR) rates of 7.57%, 77% and 11.24% for the normal, protected and overall applications respectively and with False Acceptance Rate (FAR) rates of 3.42%, 15.29% and 4.09% for their counterparts.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

SILVA, Aline Lopes da. "MODELO DE IDS PARA USUÁRIOS DE DISPOSITIVOS MÓVEIS". Universidade Federal do Maranhão, 2008. http://tedebc.ufma.br:8080/jspui/handle/tede/335.

Testo completo
Abstract (sommario):
Made available in DSpace on 2016-08-17T14:52:48Z (GMT). No. of bitstreams: 1 Aline lopes.pdf: 2261944 bytes, checksum: 0cbbb27a7a17ab362f4fce42298c4b45 (MD5) Previous issue date: 2008-06-26
Mobile devices are increasing common reality in wireless networks and have integrated the wireless environment, helping to ease and to make available information. Meanwhile, the wireless environment is subject to vulnerabilities because of the way of spreading information that is given through the air, and is subject to interception or even information theft. Mobile Devices in addition of its vulnerability to these vulnerabilities common in wireless environments, are devices with some physical limitations such as lack of processing capacity and memory, beyond the limited battery life. These limitations become critical in this kind of environment, when unidentified threats attack are directed mobile devices. It is necessary to develop an intrusion detection system dedicated to these devices to identify intrusive behaviour, taking into account their physical limitations. This work proposes an intrusion detection system (IDS, Intrusion Detection System) for wireless networks and mobile devices. This is an adaptation and extension of NIDIA-IDS (Intrusion Detection System-Network Intrusion Detection System based on Intelligent Agents). The system acts with two processes: the first one is an information tracking on the device performance and the second one is a wireless network traffic monitoring, analyzing both the traffic of monitored devices. As proof of concepts a prototype was developed and some experiments were carried to validate this solution.
Os dispositivos móveis são uma realidade cada vez mais comum em redes wireless e se integraram ao ambiente wireless, contribuindo para facilidade e disponibilidade da informação. Entretanto, o ambiente wireless está sujeito a vulnerabilidades, devido à forma de propagação da informação que se dá através do ar, estando sujeito a intercepção ou até mesmo roubo das informações. Dispositivos móveis além de estarem sujeitos a essas vulnerabilidades comuns em ambientes wireless, são dispositivos com algumas limitações físicas, como pouca capacidade de processamento e memória, além da vida útil de bateria limitada. Estas limitações tornam-se críticas neste tipo ambiente, quando ameaças não identificadas são direcionadas a dispositivos móveis. Torna-se necessário a implementação de sistema de detecção de intrusão voltado para estes dispositivos a fim de identificar comportamentos intrusivos, levando em consideração suas limitações físicas. Este trabalho propõe um sistema de detecção de intrusão (IDS, Intrusion Detection System) em redes wireless destinados a dispositivos móveis como adaptação e extensão do IDS-NIDIA (Intrusion Detection System- Network Intrusion Detection System based on Intelligent Agents). O mecanismo utiliza dois processos: o primeiro faz o monitoramento de informações sobre o comportamento do dispositivo e o segundo através do monitoramento de tráfego da rede wireless, analisando o tráfego destinado e originado aos dispositivos monitorados. A implementação da arquitetura e os testes realizados demonstram a viabilidade da solução.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Shea, Patrick. "DESIGN AND MODELING OF RADIATION HARDENED LDMOSFET FOR SPACE CRAFT POWER SYSTEMS". Master's thesis, University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2822.

Testo completo
Abstract (sommario):
NASA missions require innovative power electronics system and component solutions with long life capability, high radiation tolerance, low mass and volume, and high reliability in space environments. Presently vertical double-diffused MOSFETs (VDMOS) are the most widely used power switching device for space power systems. It is proposed that a new lateral double-diffused MOSFET (LDMOS) designed at UCF can offer improvements in total dose and single event radiation hardness, switching performance, development and manufacturing costs, and total mass of power electronics systems. Availability of a hardened fast-switching power MOSFET will allow space-borne power electronics to approach the current level of terrestrial technology, thereby facilitating the use of more modern digital electronic systems in space. It is believed that the use of a p+/p-epi starting material for the LDMOS will offer better hardness against single-event burnout (SEB) and single-event gate rupture (SEGR) when compared to vertical devices fabricated on an n+/n-epi material. By placing a source contact on the bottom-side of the p+ substrate, much of the hole current generated by a heavy ion strike will flow away from the dielectric gate, thereby reducing electrical stress on the gate and decreasing the likelihood of SEGR. Similarly, the device is hardened against SEB by the redirection of hole current away from the base of the device's parasitic bipolar transistor. Total dose hardness is achieved by the use of a standard complementary metal-oxide semiconductor (CMOS) process that has shown proven hardness against total dose radiation effects.
M.S.E.E.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering MSEE
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Alemayehu, Andargachew Desta. "Microwave Frequency Thin BST Film Based Tunable Shunt and Series Interdigital Capacitor Device Design". University of Dayton / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1304558851.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Chang, David Wei-Péng. "ST. JUDE MEDICAL: PULMONARY EDEMA MONITORING IN PACEMAKERS AND ICDS". DigitalCommons@CalPoly, 2013. https://digitalcommons.calpoly.edu/theses/1112.

Testo completo
Abstract (sommario):
Pulmonary edema occurs when fluid leaks from the pulmonary capillary network into the lung interstitium and alveoli. When the heart is not able to pump blood to the body efficiently, fluid can back up into the veins that take blood through the lungs to the left atrium. This then builds up the pressure in the blood vessels and fluid is pushed into the alveoli in the lungs. The fluid reduces normal oxygen movement through the lungs and can cause impaired gas exchange and respiratory failure. There are many causes of congestive heart failure that may lead to pulmonary edema such as heart attack, any diseases of the heart that weaken or stiffen the heart muscle, a leaking or narrowed heart valve, and sudden, severe high blood pressure. Pulmonary edema is a strong indicator of congestive heart failure in patients and therefore can be used as a gauge for congestive heart failure. One way to diagnose cardiogenic pulmonary edema constantly is through the continuous monitoring of the transthoracic impedance throughout the day. One method to achieve this constant monitoring is through the use of a cardiac pacemaker or an implantable cardioverter defibrillator (ICD). Many patients who are at risk of heart failure have these medical devices implanted already. In these implantable cardiac devices, the connected cardiac leads can be utilized to continually screen several impedance vectors for decreases in impedance in the thoracic cavity. A pacemaker or ICD that implements Pulmonary Edema Monitoring is designed to continuously monitor these impedance vectors and alert the patient to seek medical attention. This thesis will discuss the implementation of Pulmonary Edema Monitoring via screening of multiple impedance vectors in a pacemaker or implantable cardioverter defibrillator and the effectiveness of this monitoring method. Furthermore, the design, implementation, and testing of this feature will be explored in greater detail.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Liu, Haitao. "Novel 3-D CMOS and BiCMOS devices for high-density and high-speed ICs /". View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20LIU.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Andersson, Dorothea. "Simulation of industrial control system field devices for cyber security". Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.

Testo completo
Abstract (sommario):
Industrial Control Systems (ICS) are an integral part of modernsociety, not least when it comes to controlling and protecting criticalinfrastructure such as power grids and water supply. There is a need to testthese systems for vulnerabilities, but it is often difficult if not impossible to doso in operational real time systems since they have been shown to be sensitiveeven to disturbances caused by benign diagnostic tools. This thesis exploreshow ICS field devices can be simulated in order to fool potential antagonists,and how they can be used in virtualized ICS for cyber security research. 8different field devices were simulated using the honeypot daemon Honeyd,and a generally applicable simulation methodology was developed. It was alsoexplored how these simulations can be further developed in order to functionlike real field devices in virtualized environments.
Industriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Seidel, Robert Viktor. "Carbon Nanotube Devices". Doctoral thesis, Technische Universität Dresden, 2004. https://tud.qucosa.de/id/qucosa%3A24460.

Testo completo
Abstract (sommario):
Eine Reihe wichtiger Wachstums- und Integrationsaspekte von Kohlenstoff-Nanoröhren wurde im Rahmen dieser Arbeit untersucht. Der Schwerpunkt der experimentellen Arbeit lag dabei hauptsächlich bei einschaligen Kohlenstoffnanoröhren (SWCNT). Das große Potential dieser Nanoröhren für Transistor-Anwendungen wurde durch die Herstellung einer Vielzahl funktionierender Bauelemente aus diesen Kohlenstoffnanoröhren mittels relativ einfacher Herstellungsprozesse demonstriert. Ein fundiertes Verständnis für die Abhängigkeiten des Nanoröhrenwachstums von einer Vielzahl an Parametern wurde mit Hilfe mehrerer tausend Wachstumsexperimente gesammelt. Verschiedene Katalysatormetalle, Kohlenstoffquellen und Katalysatorunterlagen wurden detailliert untersucht. Ein Hauptaugenmerk wurde dabei auf eine Reduzierung der Wachstumstemperatur gerichtet. Die niedrige Wachstumstemperatur spielt eine große Rolle für eine möglichst hohe Kompatibilität mit konventionellen Herstellungsverfahren der Silizium-Halbleitertechnik. Ein einfaches phänomenologisches Wachstumsmodell wurde für die Synthese von Nanoröhren mittels katalytisch-chemischer Gasphasen-Abscheidung (CCVD) formuliert. Dieses Modell basiert hauptsächlich auf der Oberflächendiffusion von adsorbierten Kohlenstoffverbindungen entlang der Seitenwände der Nanoröhren sowie auf der Oberfläche der Katalysatorunterlage. Das Modell ist eine wichtige Ergänzung zu dem VLS-Mechanismus. Ein Wachstumsverfahren zur Herstellung von Nanoröhren für niedrigere Temperaturen bis zu 600 °C wurde entwickelt. Experimentell wurde nachgewiesen, dass der Durchmesser des Katalysatorteilchens fast ausschließlich bestimmt, wie viele Schalen eine wachsende Nanoröhre bei geeigneten Wachstumsbedingungen hat. Es wurde zum ersten Mal gezeigt, dass einschalige Kohlenstoffnanoröhren auf Metallelektroden wachsen werden können, insofern eine dünne Aluminiumschicht als Trennschicht verwendet wird. Dadurch können in-situ kontaktierte Nanoröhren einfach hergestellt werden, was deren elektrische Charakterisierung weitaus erleichtert. Mittels stromloser Abscheidung von Nickel oder Palladium aus einer Lösung konnte eine deutliche Verbesserung der Kontaktwiderstände der in-situ-kontaktierten Nanoröhren erreicht werden. Durch Einbettung von Nanoröhren in eine Tantaloxidschicht konnten Transistoren mit einem Dielektrikum mit hoher relativer Dielektrizitätskonstante hergestellt werden. Die Tantaloxidschicht wurde mit einem neu entwickelten Tauchprozess abgeschieden. Erstmalig wurden Transistoren basierend auf Kohlenstoffnanoröhren hergestellt, die relativ hohe Ströme (Milliampere) mit einer Modulation bis zu einem Faktor 500 schalten können. Diese Transistoren beruhen auf einer Parallelschaltung einer großen Anzahl an Nanoröhren. Mit Hilfe der hergestellten Transistoren konnten die Eigenschaften einer großen Zahl von Nanoröhren untersucht werden, wobei große Unterschiede in den elektronischen Eigenschaften von metallischen Nanoröhren, halbleitenden Nanoröhren und Nanoröhren mit einer kleinen Bandlücke beobachtet wurden.
A number of very important growth and integration aspects of carbon nanotubes have been investigated during the course of this thesis. The focus was mainly on single-walled carbon nanotubes. Their potential for transistor applications was demonstrated by the successful fabrication of a variety of devices using rather simple processes. A detailed understanding of the dependence of SWCNT growth on a variety of parameters was obtained as the result of several thousand growth experiments. Various catalyst materials, gaseous carbon sources, and catalyst supports have been investigated. Special attention was paid to a considerable reduction of the growth temperature. A simple phenomenological growth model could be derived for CCVD of SWCNTs taking into account a number of effects observed during the various growth experiments. The model presented is mainly based on the surface diffusion of carbon species along the sidewalls of the carbon nanotubes or on the catalyst support and is an addition to the vapor-liquid-solid (VLS) mechanism. Growth methods for the CCVD synthesis of SWCNTs were developed for temperatures as low as 600 °C. It has been found that the size of the catalyst particle alone determines whether a SWCNT, DWCNT, or MWCNT will nucleate from a specific particle under suitable growth conditions. It could be demonstrated for the first time that SWCNTs can be grown on a variety of conducting materials if the catalyst is separated from the electrode by a thin Al layer. In-situ contacted SWCNTs can be easily obtained that way, largely facilitating the electronic characterization of as-grown SWCNTs. A tremendous improvement of the contacts of in-situ contacted SWCNTs could be achieved by electroless deposition. SWCNT growth on appropriate electrodes allowed the encapsulation of the nanotubes by electroless deposition of Ni and Pd, yielding good and reliable contacts. SWCNT transistors with a high-k dielectric could be fabricated by encapsulation of the nanotube with a tantalum oxide layer. The tantalum oxide was deposited by a newly developed dip-coat process. High-current SWCNT transistors consisting of a large number of SWCNTs in parallel were demonstrated for the first time during this work. Finally, the properties of a large number of CCVD grown SWCNTs have been investigated by electronic transport measurement. Large differences in the electronic transport have been observed for metallic, small band gap semiconducting (SGS), and semiconducting SWCNTs with small diameters.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Rajan, Parthiban. "Novel Capacitive Sensors for Chemical and Physical Monitoring in Microfluidic Devices". Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1549449776383119.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Wu, Yudong. "Simulation of graphene electronic devices". Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/1554/.

Testo completo
Abstract (sommario):
Since the publication of research in the mid-1980s describing the formation of freeform graphene there has been an enormous growth in interest in the material. Graphene is of interest to the semiconductor industry because of the high electron mobility exhibited by the material and, as it is planar, it is compatible with silicon technology. When patterned into nanoribbons graphene can be made into regions that are semiconducting or conducting and even into entire circuits. Graphene nanoribbons can also be used to form the channel of a MOSFET. This thesis describes numerical simulations undertaken on devices formed from graphene. The energy band structure of graphene and graphene nanoribbons is obtained using nearest-neighbour and third nearest-neighbour interactions within a tight binding model. A comparison of the current-voltage characteristics of MOS structures formed on graphene nanoribbons and carbon nanotubes suggests that the nanoribbon devices may be better for switching applications. Conductivities of graphene nanoribbons and junctions formed from them were obtained using a nonequilibrium Green’s function formulation. The effects of defects and strain on these systems were also studied using this technique. Advancements were made when the self-energies used within the nonequilibrium Green’s function were obtained from an iterative scheme including third nearestneighbour interactions. An important result of this work is that accurate simulations of graphene based devices should include third nearest-neighbour interactions within the tight binding model of the energy band structure.
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Ids and devices"

1

(Europe), NEC Electronics. Consumer LSI devices digital ICs. Dusseldorf: NEC Electronics Europe, 1991.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

McMenamin, J. Michael. Applied electronic devices and analog ICs. Albany, NY: Delmar Publishers, 1995.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Motorola. Analog/interface ICs device data. 5a ed. Phoenix, AZ: Motorola, 1995.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Motorola. Linear/interface ICs device data. 4a ed. Phoenix, AZ: Motorola, 1993.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

(Europe), NEC Electronics. Consumer LSI Devices uPD17k/612x families on screen display ICs. Dusseldorf: NEC Electronics Europe, 1991.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Dreyer, Arek. Managing Apple devices: Deploying and maintaining iOS 8 and OS X Yosemite devices. San Francisco]: Peachpit Press, 2015.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Matas, Brian. Memory 1997: Complete coverage of DRAM, SRAM, EPROM, and flash memory ICs. Scottsdale, AZ: Integrated Circuit Engineering Corp., 1997.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Etherton, Melanie. Charged device model (CDM) ESD in ICs: Physics, modeling, and circuit simulation. Konstanz: Hartung-Gorre, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

International, Symposium on Power Semiconductor Devices &. ICs (9th 1997 Weimar Germany). ISPSD '97: 1997 IEEE International Symposium on Power Semiconductor Devices and ICs, May 26-29, 1997, Weimar, Germany. [New York, N.Y.]: Institute of Electrical and Electronics Engineers, 1997.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

International Symposium on Power Semiconductor Devices & ICs (8th 1996 Maui, Hawaii). ISPSD '96 proceedings: The 8th International Symposium on Power Semiconductor Devices & ICs, May 20-23, 1996, Maui, Hawaii. Piscataway, N.J: IEEE Service Center [distributor], 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Ids and devices"

1

Sharma, Sonal, Yashwant Singh e Pooja Anand. "Time Series-Based IDS for Detecting Botnet Attacks in IoT and Embedded Devices". In Lecture Notes in Electrical Engineering, 351–61. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0601-7_27.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Akintade, Sesan, Seongtae Kim e Kaushik Roy. "Explaining Machine Learning-Based Feature Selection of IDS for IoT and CPS Devices". In IFIP Advances in Information and Communication Technology, 69–80. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34107-6_6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Williams, Richard K., Mohamed N. Darwish, Theodore J. Letavic e Mikael Östling. "Power Devices and ICs". In Guide to State-of-the-Art Electron Devices, 203–12. Chichester, UK: John Wiley & Sons, Ltd, 2013. http://dx.doi.org/10.1002/9781118517543.ch15.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Nahler, Gerhard. "investigational device exemption (IDE)". In Dictionary of Pharmaceutical Medicine, 97. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_732.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Hirayama, Masahiro, Kazuyoshi Asai e Takashi Mizutani. "GaAs ICs for Digital Applications". In Compound and Josephson High-Speed Devices, 83–139. Boston, MA: Springer US, 1993. http://dx.doi.org/10.1007/978-1-4757-9774-9_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Roman, Steven. "Device Interfaces: Floppy, IDE and SCSI". In Understanding Personal Computer Hardware, 203–29. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4684-6419-1_14.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Veendrick, Harry J. M. "Manufacture of MOS Devices". In Nanometer CMOS ICs, 73–159. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47597-4_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Veendrick, H. J. M. "Manufacture of MOS devices". In Nanometer CMOS ICs, 93–183. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8333-4_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Leidl, Anton, Bernhard Mader e Stephan Drost. "Saw and IDC Devices as Oil Quality Sensors". In Advanced Microsystems for Automotive Applications 98, 273–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-662-39696-4_26.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Leidl, Anton, Bernhard Mader e Stephan Drost. "Saw and IDC Devices as Oil Quality Sensors". In Advanced Microsystems for Automotive Applications 98, 273–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72146-5_26.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Ids and devices"

1

Skowyra, Richard, Sanaz Bahargam e Azer Bestavros. "Software-Defined IDS for securing embedded mobile devices". In 2013 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 2013. http://dx.doi.org/10.1109/hpec.2013.6670325.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Faber, Kamil, Lukasz Faber e Bartlomiej Sniezynski. "Autoencoder-based IDS for cloud and mobile devices". In 2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE, 2021. http://dx.doi.org/10.1109/ccgrid51090.2021.00088.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

"List of paper IDs and authors". In 2015 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD). IEEE, 2015. http://dx.doi.org/10.1109/asemd.2015.7453436.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Gupta, Mridula. "GaN HEMT Device Model Development for Implementation of Different Circuit". In 16th International Seminar On Power Semiconductors. Czech Technical University in Prague, 2023. http://dx.doi.org/10.14311/isps.2023.004.

Testo completo
Abstract (sommario):
GaN HEMT devices (with different dimensions) have been investigated using 16- and 22-element smallsignal equivalent circuit Model. The percentage error is estimated to show the difference in extracted parameters using 16- and 22-element small-signal equivalent circuit model which assist in choosing the accurate small-signal model for large gate periphery GaN HEMTs. For device’s low power operation linear models are sufficient. In order to achieve higher certainty for high power applications, the nonlinear behaviour of the device must be considered. While generating the large-signal device model, the nonlinear capacitances Cgs and Cgd, as well as the current source Ids are primarily considered to capture the non-linear behavior of the device. The capacitances, Cgs and Cgd, are dependent on applied bias i. e. V gs and Vds. The Angelov model for Ids is used to generate the non-linear model parameters which uses the multi-bias small-signal equivalent circuit parameters.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Agbedanu, Promise R., Richard Musabe, James Rwigema, Ignace Gatare e Yanis Pavlidis. "IPCA-SAMKNN: A Novel Network IDS for Resource Constrained Devices". In 2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE). IEEE, 2022. http://dx.doi.org/10.1109/ismode56940.2022.10180926.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

"ASEMD 2018 List of Paper IDs and Authors". In 2018 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices (ASEMD). IEEE, 2018. http://dx.doi.org/10.1109/asemd.2018.8558912.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Putrada, Aji Gautama, Nur Alamsyah, Syafrial Fachri Pane e Mohamad Nurkamal Fauzan. "XGBoost for IDS on WSN Cyber Attacks with Imbalanced Data". In 2022 International Symposium on Electronics and Smart Devices (ISESD). IEEE, 2022. http://dx.doi.org/10.1109/isesd56103.2022.9980630.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Pomsathit, Auttapon. "Performance analysis of IDS with honey pot on new media broadcasting". In 2017 International Conference on Circuits, Devices and Systems (ICCDS). IEEE, 2017. http://dx.doi.org/10.1109/iccds.2017.8120478.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Yun, Keon, Philip Virgil Astillo, Sangmin Lee, Jiyoon Kim, Bonam Kim e Ilsun You. "Behavior-Rule Specification-based IDS for Safety-Related Embedded Devices in Smart Home". In 2021 World Automation Congress (WAC). IEEE, 2021. http://dx.doi.org/10.23919/wac50355.2021.9559588.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Ramesh Kumar, M., e Pradeep Sudhakaran. "Comprehensive Survey on Detecting Security Attacks of IoT Intrusion Detection Systems". In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-270t9z.

Testo completo
Abstract (sommario):
With the growth of Internet of Things (IoT), which connects billions of small, smart devices to the Internet, cyber security has become more difficult to manage. These devices are vulnerable to cyberattacks because they lack defensive measures and hardware security support. In addition, IoT gateways provide the most fundamental security mechanisms like firewall, antivirus and access control mechanism for identifying such attacks. In IoT setting, it is critical to maintain security, and protecting the network is even more critical in an IoT network. Because it works directly at local gateways, the Network Intrusion Detection System (NIDS) is one of the most significant solutions for securing IoT devices in a network. This research includes various IoT threats as well as different intrusion detection systems (IDS) methodologies for providing security in an IoT environment, with the goal of evaluating the pros and drawbacks of each methodology in order to discover future IDS implementation paths.
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Ids and devices"

1

Kraushaar, Judith, e Sabine Bohnet-Joschko. Prevalence and patterns of mobile device usage among physicians in clinical practice: a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, maggio 2022. http://dx.doi.org/10.37766/inplasy2022.5.0087.

Testo completo
Abstract (sommario):
Review question / Objective: The aim of this review is to systematically analyze quantitative data extracted from studies on the use of mobile devices by physicians in clinical practice in order to be able to derive concrete statements on the prevalence, patterns, and trends of usage. Condition being studied: Prevalence, patterns, and trends of mobile device usage by physicians in clinical practice. Main outcome(s): With this review, we want to open a new perspective on the use of mobile devices. Together with the information from qualitative reviews, the particular relevance of mobile devices for KM strategies in hospitals can be viewed in its entirety.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Kim, Tae-Hun, e Jung Won Kang. The clinical evidence of effectiveness and safety of massage chair: a scoping review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, febbraio 2023. http://dx.doi.org/10.37766/inplasy2023.2.0021.

Testo completo
Abstract (sommario):
Review question / Objective: To evaluate current clinical evidence status of massage chair and to present evidence map for future research implication. Background: A massage chair is a furniture-type device such as a sofa or bed which provides automated massage using installed rollers and airbags. Although the market is growing and the number of users is increasing, its clinical evidence of the benefit and harm has not been clearly established yet. Because it is accepted like a furniture not a medical devices, its use is not controlled by medical personnel like other medical devices, so there is a need to pay attention to safety issues and effectiveness in terms of individual health promotion. This scoping review will assess the current evidence status of massage chair and present clinical research agenda in future.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Tow Leong, Tiang, Mohd Saufi Ahmad, Ang Qian Yee, Syahrun Nizam Md Arshad@Hashim, Mohd Faizal Mohd Zahir, Mohd Azlizan Moh Adib, Nazril Husny, Tan Kheng Kwang e Dahaman Ishak. HANDBOOK OF ELECTRICAL SYSTEM DESIGN FOR NON-DOMESTIC BUILDING. Penerbit Universiti Malaysia Perlis, 2023. http://dx.doi.org/10.58915/techrpt2023.001.

Testo completo
Abstract (sommario):
This technical report presents the electrical system installation design for development of a factory with 1 storey and 2 storey of offices. Firstly, the general methodology of designing the electrical system are elaborated in this report. As overall, the methodologies in designing the components of the electrical system are explained and elaborated, which included: (a) load and maximum demand estimation; (b) miniature circuit breaker (MCB) selection; (c) moulded case circuit breaker (MCCB) selection; (d) air circuit breaker (ACB) selection, (e) residual current device (RCD) selection; (f) protection relay selection; (g) current transformer (CT) selection; (h) sizing selection for cable and live conductors; (i) capacitor bank selection for power factor correction (PFC); and (j) distribution transformer and its protection devices selection. Then, the electrical system of this project is computed and designed by using the methodologies aforementioned. Firstly, the electrical system of various distribution boards (DBs) with the protection/metering devices along with its phase and earthing cables for every final circuits are designed and installed in the factory. Next, the installation is proceeded with the electrical system of main switchboard (MSB) with the protection/metering devices along with its phase and earthing cables for every DBs. Also, the electrical system of PFC by using detuned capacitor bank with various protection/metering devices is designed and built in the plant. Apart from that, the factory is equipped with the electrical system of high tension (HT) room that included the distribution power transformer with the protection/metering devices along with its phase and earthing cables. Lastly, the methodologies and the computation design of the electrical system installation in the context of connected load, load currents, maximum demand, MCB, MCCB, ACB, RCD, protection relay, metering CTs, live cable, protection conductor/earth cable, detuned capacitor bank, and distribution transformer, are prepared according to several important standards, for instance, the MS IEC 60364, Electrical Installations for Buildings, Suruhanjaya Tenaga (ST) – Non-Domestic Electrical Installation Safety Code, Electricity Supply Application Handbook, Tenaga Nasional Berhad (TNB).
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Navarro, Juan Carlos. The One Laptop Per Child Initiative: A Framework for Latin America and the IDB. Inter-American Development Bank, ottobre 2006. http://dx.doi.org/10.18235/0009110.

Testo completo
Abstract (sommario):
The One Laptop Per Child initiative is an educational program that aims at deploying millions of rugged, ultra low-cost, individually connected laptop computers to the majority of children in developing nations that today lack access to such devices.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Teng, Henry, e Khalid Mosalam. Long-Term Monitoring of Bridge Settlements using Vision-Based Embedded System. Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, dicembre 2020. http://dx.doi.org/10.55461/apri8198.

Testo completo
Abstract (sommario):
The State of California is highly seismic, capable of generating large-magnitude earthquakes that could cripple the infrastructure of several large cities. Yet the annual maintenance of the State’s bridges, such as highway overpasses, is not robust due to budget and staff constraints. Over 1000 bridges were not inspected according to the California Department of Transportation’s (Caltrans) 2015 Maintenance Plan. To help engineers monitor infrastructure conditions, presented within is a device recently developed that employs modern sensing, computing, and communication technologies to autonomously measure and remotely report vertical settlements of bridges, such as highway overpasses. Given the limitations of existing measurement devices, we propose a novel vision-based method that employs a camera to take a picture of a projected laser beam. This new device is referred to as the Projected Laser Target Method (PLTM). This report documents the embedded system design and development of two prototypes. The first prototype implements communication over a local WIFI network using synchronous code to measure distance over time; this PLTM is deployed in a laboratory setting. The second device under study implements communication over a Bluetooth Low Energy system using asynchronous code and communication over 2G cellular networks using synchronous code, with the aim of determining its accuracy in the field. This report evaluates the performance of the field-suitable system in terms of its system reliability, measurement accuracy and precision, power consumption, and its overall system performance.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Chappell, Mark, Wu-Sheng Shih, Cynthia Price, Rishi Patel, Daniel Janzen, John Bledsoe, Kay Mangelson et al. Environmental life cycle assessment on CNTRENE® 1030 material and CNT based sensors. Engineer Research and Development Center (U.S.), settembre 2021. http://dx.doi.org/10.21079/11681/42086.

Testo completo
Abstract (sommario):
This report details a study investigating the environmental impacts associated with the development and manufacturing of carbon nanotube (CNT)–based ink (called CNTRENE 1030 material) and novel CNT temperature, flex, and moisture sensors. Undertaken by a private-public partnership involving Brewer Science (Rolla, Missouri), Jordan Valley Innovation Center of Missouri State University (Springfield, Missouri), and the US Army Engineer Research and Development Center (Vicksburg, Mississippi), this work demonstrates the environmental life cycle assessment (ELCA) methodology as a diagnostic tool to pinpoint the particular processes and materials posing the greatest environmental impact associated with the manufacture of the CNTRENE material and CNT-based sensor devices. Additionally, ELCA tracked the degree to which optimizing the device manufacturing process for full production also changed its predicted marginal environmental impacts.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Norsworthy, Marcelo, Jennelle Thompson e Emma Näslund-Hadley. IDB Briefly Noted: No. 7 : December, 2010: Building a Future of Inquisitive Scientists in Peru. Inter-American Development Bank, dicembre 2010. http://dx.doi.org/10.18235/0008214.

Testo completo
Abstract (sommario):
Peru's Ministry of Education has partnered with the Inter-American Development Bank (IDB) and LEGO Education to develop a program that helps children improve their ability to solve scientific problems using a set of curriculum materials that is affordable and can be brought to a national scale. Working in teams on problems that capture their interest, students devise solutions, reflect on what they build while solving the problem, and apply what they have learned to new challenges. This brief describes a pilot initiative and its evaluation design and baseline.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Chierichetti, Maria, Armin Chierichetti e Fatemeh Davoudi. Design of an Evaluation Plan for Senate Bill 1046. Mineta Transportation Institute, luglio 2022. http://dx.doi.org/10.31979/mti.2021.2209.

Testo completo
Abstract (sommario):
In an effort to understand and decrease alcohol-impaired driving as a primary collision factor In California, the research team designed an evaluation plan for California Senate Bill 1046 and its focus on ignition interlock devices as a sentence for Driving Under Influence offense. This plan will evaluate whether Senate Bill 1046 affected the Driving Under the Influence crash frequency and severity, and whether sociodemographic and geographic factors influence its effectiveness. This report lays the foundation for the evaluation that will be conducted in 2024. The research team conducted a meta-analysis of the last 12 years of literature and research on ignition interlock programs inside and outside the United States. Based on the findings of this analysis, the recommended evaluation plan of the law revolves around three research questions that focus on the changes in the frequency/severity of DUI-related crashes in California, the impact of the law on recidivism and on interlock installation rates. To respond to these questions, the research team recommends a list of data that should be collected, such as the number of injuries and deaths resulting from alcohol-related motor vehicle accidents, installation rates of ignition interlocks compared to the prior five-year period, the number of individuals who were required to have an ignition interlock device installed who were convicted of an alcohol-related violation, as well as number of lockouts while an interlock is installed. The research team proposed several statistical approaches for the analysis of this data, such as descriptive statistics, time series analysis, analysis of variance, and logistic regression.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Chierichetti, Maria, Armin Chierichetti e Fatemeh Davoudi. Design of an Evaluation Plan for Senate Bill 1046. Mineta Transportation Institute, luglio 2022. http://dx.doi.org/10.31979/mti.2022.2209.

Testo completo
Abstract (sommario):
In an effort to understand and decrease alcohol-impaired driving as a primary collision factor In California, the research team designed an evaluation plan for California Senate Bill 1046 and its focus on ignition interlock devices as a sentence for Driving Under Influence offense. This plan will evaluate whether Senate Bill 1046 affected the Driving Under the Influence crash frequency and severity, and whether sociodemographic and geographic factors influence its effectiveness. This report lays the foundation for the evaluation that will be conducted in 2024. The research team conducted a meta-analysis of the last 12 years of literature and research on ignition interlock programs inside and outside the United States. Based on the findings of this analysis, the recommended evaluation plan of the law revolves around three research questions that focus on the changes in the frequency/severity of DUI-related crashes in California, the impact of the law on recidivism and on interlock installation rates. To respond to these questions, the research team recommends a list of data that should be collected, such as the number of injuries and deaths resulting from alcohol-related motor vehicle accidents, installation rates of ignition interlocks compared to the prior five-year period, the number of individuals who were required to have an ignition interlock device installed who were convicted of an alcohol-related violation, as well as number of lockouts while an interlock is installed. The research team proposed several statistical approaches for the analysis of this data, such as descriptive statistics, time series analysis, analysis of variance, and logistic regression.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Ward, Andrew, Anthony Falls e Craig Rutland. Development of smartphone-based semi-prepared runway operations (SPRO) models and methods. Engineer Research and Development Center (U.S.), dicembre 2021. http://dx.doi.org/10.21079/11681/42500.

Testo completo
Abstract (sommario):
The U.S. Army Engineer Research and Development Center (ERDC) has developed a method for predicting surface friction response by use of ground vehicles equipped with deceleration-based measurement devices. Specifically, the ERDC has developed models and measurement methods between the Findlay Irvine Mk2 GripTester and a variety of deceleration measurement devices: Bowmonk AFM2 Mk3, Xsens MTi-G-710, two Android smartphones, and two iOS smartphones. These models show positive correlation between ground vehicle deceleration and fixed-slip surface continuous surface friction measurement. This effort extends prior work conducted by the U.S. Army ERDC in developing highly correlative models between the Findlay Irvine Mk2 GripTester and actual C-17 braking deceleration, measured via the runway condition rating (RCR) system. The models and measurement methods detailed here are of considerable use to semi-prepared airfield managers around the world needing to measure safe landing conditions following inclement weather. This work provides the tools necessary for airfield managers to quantify safe landing conditions for C-17 aircraft by using easily obtainable equipment and simple test standards.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia