Low-cost modules for remote engineering education: performing laboratory experiments over the Internet

Author(s):  
Hong Shen ◽  
M.S. Shur ◽  
T.A. Fjeldly ◽  
K. Smith
2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


1986 ◽  
Vol 18 (2) ◽  
pp. 151-156 ◽  
Author(s):  
R. Zapf-Gilje ◽  
S. O. Russell ◽  
D. S. Mavinic

When snow is made from sewage effluent, the impurities become concentrated in the early melt leaving the later runoff relatively pure. This could provide a low cost method of separating nutrients from secondary sewage effluent. Laboratory experiments showed that the degree of concentration was largely independent of the number of melt freeze cycles or initial concentration of impurity in the snow. The first 20% of melt removed with it 65% of the phosphorus and 90% of the nitrogen from snow made from sewage effluent; and over 90% of potassium chloride from snow made from potassium chloride solution. Field experiments with a salt solution confirmed the laboratory results.


2002 ◽  
Vol 41 (05) ◽  
pp. 414-418 ◽  
Author(s):  
I. Mavridis ◽  
C. Ilioudis ◽  
C. Georgiadis ◽  
G. Pangalos

Summary Objectives: Internet technologies provide an attractive infrastructure for efficient and low cost communications in regional health information networks. The advantages provided by the Internet come however with a significantly greater element of risk to the confidentiality and integrity of information. This is because the Internet has been designed primarily to optimize information sharing and interoperability, not security. The main objective of this paper is to propose the exploitation of public-key cryptography techniques to provide adequate security to enable secure healthcare Internet applications. Methods: Public-key cryptography techniques can provide the needed security infrastructure in regional health networks. In the regional health-care security framework presented in this paper, we propose the use of state-of-art Public Key Infrastructure (PKI) technology. Such an e-Health PKI consists of regional certification authorities that are implemented within the central hospitals of each region and provide their services to the rest of the healthcare establishments of the same region. Results: Significant experience in this area has been gained from the implementation of the PKI@AUTH project. Conclusions: The developed PKI infrastructure already successfully provides its security services to the AHEPA university hospital. The same infrastructure is designed to easily support a number of hospitals participating in a regional health information network.


2020 ◽  
Author(s):  
Luciano A. E. Silva ◽  
Ivan Barroso ◽  
Alexsander Menezes ◽  
Alessandro R. L. Zachi ◽  
Milena F. Pinto ◽  
...  

Student access to laboratory experiments is critical in undergraduate engineering courses since it integrates theory and practice. The access of students to such practical examples helps them to understand and apply what is learned. However, due to rapid technological advancement, educational kits can quickly become obsolete. Besides, there are many known commercial platforms for training.Many of them have steep prices, which makes their availability dicult for every student. The present work proposes a low-cost ATMEGA-based system as the main device for an educational tool for training Control System Theory. The system enables the students to test dierent control strategies through the use of a simple educational kit.


Author(s):  
Luísa Cruz Lobato

El artículo analiza la estructuración de la política de ciberseguridad de Brasil entre los años de 2003 y 2016 como componente de su estrategia de inserción internacional y proyección de liderazgo en el Sul Global. El campo de la gobernanza de la Internet, de lo cual la ciberseguridad es parte, ofrece al país una oportunidad de relativo bajo costo de protagonismo en la elaboración de normas internacionales. Analizase documentos principales de esa política y argumentase que ella es parte de los esfuerzos de proyección del soft power del país en el campo de la seguridad internacional, pero que sus incoherencias pueden afectar y hasta mismo comprometer esta estrategia. Por fin, trazase breves proyecciones para esta política ante los cambios políticos en Brasil.AbstractThe article analyzes the structuration of Brazil’s cybersecurity policy between the years of 2003 and 2016 as a component of its strategy of international insertion and projection of leadership in the Global South. The Internet governance field, of which cybersecurity is a part, offers the country a relatively low-cost opportunity of protagonism in the elaboration of international norms. It analyzes cornerstone documents of this policy and argues that it is a part of the country’s efforts to project its soft power in the field of international security, but that its incoherencies can affect and even compromise the strategy. Finally, it draws brief projections to this policy in face of political changes in Brazil. 


Author(s):  
Suryadiputra Liawatimena

The aim of this study is to use Radio Frequency technology to facilitate human activities, especially used in Busway entrances. In this research methodologies used include field survey to the BP Transjakarta; literature study by reading manuals, text books, journals, and articles on the Internet, and conduct laboratory experiments on the Bina Nusantara University Hardware Research Laboratory in designing and making the minimum system . Based on the results of an experiment and taking data on the minimum system, it can be concluded in general the performance of the system is running well, but the response time was not optimal. Some improvements to the system needed to improve system performance, such as raising response time, improved data security, and online systems. 


Author(s):  
Ravikiran Kamate ◽  
Sulakshna Baliga ◽  
M. D. Mallapur

Background: Internet addiction is not clinical diagnosis, but a potentially pathological behavioral pattern with symptoms: a loss of control over the behavior, preoccupation with the Internet, using the Internet to modify mood, and withdrawal symptoms. Easy access and low cost of Internet packs- are main cause of development of increased internet use in India. Internet addiction – factors like gender, environmental factors, socioeconomic status, etc. have effect on internet use.Methods: Cross-sectional study conducted during January 2016 to February 2016. Data was collected among 500 engineering students of four engineering colleges of Belagavi city using young's questionnaire. Analysis was performed using SPS 20. Chi-square applied as statistical test of significance for the association between age, sex, residence, SES and schooling. P<0.01 was considered to be statistically significant.Results: The present study revealed that 16.2 and 6.2% of participants had moderate and severe form of internet addiction respectively. With increase in age prevalence of addiction increased. Internet addiction was more among Males when compared to females. Addiction was seen more in students whose both parents were working.Conclusions: Internet addiction is an emerging form of addiction among students with males more than females mostly among engineering students who are dependent on internet for their work, carrier and completion of course Hence it's time to develop comprehensive intervention approach to promote healthy and safe internet use from family, college and peers.


Sign in / Sign up

Export Citation Format

Share Document