Semiconductor Science and Information Devices
Latest Publications


TOTAL DOCUMENTS

28
(FIVE YEARS 28)

H-INDEX

0
(FIVE YEARS 0)

Published By Bilingual Publishing Co.

2661-3212

2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Linsheng Wang

Green hydrogen production from the electrolysis of water has good application prospect due to its renewability. The applied voltage of 1.6-2.2V isrequired in the traditional actual water electrolysis process although the the oretical decomposition potential of electrolyzing water is 1.23V. The high overpotential in the electrode reaction results in the high energy-consuming for the water electrolysis processes. The overpotentials of the traditional Ru, Ir and Pt based electrocatalysts are respectively 0.3V, 0.4V and 0.5V, furthermore use of the Pt, Ir and Ru precious metal catalysts also result in high cost of the water electrolysis process. For minimizing the overpoten tials in water electrolysis, a novel super-alloy nanowire electrocatalysts have been discovered and developed for water splitting in the present pa per. It is of significance that the overpotential for the water electrolysis on the super-alloy nanowire electrocatalyst is almost zero. The actual voltage required in the electrolysis process is reduced to 1.3V by using the novel electrocatalyst system with zero overpotential. The utilization of the super-alloy nanowire type electrocatalyst instead of the traditional Pt, Ir and Ru precious metal catalysts is the solution to reduce energy consumption and capital cost in water electrolysis to generate hydrogen and oxygen.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Hla Myo Tun ◽  
Khin Kyu Kyu Win ◽  
Zaw Min Naing ◽  
Devasis Pradhan ◽  
Prasanna Kumar Sahu

The system analysis of specific absorption rate (SAR) in human body exposed to a base station antenna by using finite difference time domain techniques was presented in this research works. The objectives of this work are to evaluate the knowledge and awareness about SAR among human body and mobile base station. The paper investigates the electromagnetic wave absorption inside a human body. The human body has been identified using dataset based on 2D object considering different electrical parameters.The SAR convinced inside the human body model exposed to a radiating base station antenna (BSA) has been considered for multiple numbers of carrier frequencies and input power of 20 W/carrier at GSM 900 band.The distance (R) of human body from BSA is varied in the range of 0.1 m to 5.0 m. For the number of carrier frequency equal to one and R = 0.1 m,the concentrated value of whole-body average SAR obtained by FDTD technique is found to be 0.68 W/kg which decreases either with increase of R or decrease of number of carrier frequencies. Safety distance for general public is found to be 1.5 m for number of carrier frequencies equal to one.The performance accuracy of this analysis meets the high level condition by comparing with the relevant system development in recent time.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Husam Abduldaem Mohammed ◽  
Aqiel Almamori ◽  
Ali A. Alwahib

This paper reports a fiber Bragg grating (FBG) as a biosensor. The FBGs were etched using a chemical agent,namely,hydrofluoric acid (HF). This implies the removal of some part of the cladding layer. Consequently, the evanescent field propagating out of the core will be closer to the environment and become more sensitive to the change in the surrounding. The proposed FBG sensor was utilized to detect toxic heavy metal ions aqueous medium namely, copper ions (Cu2+). Two FBG sensors were etched with 20 and 40 μm diameters and fabricated. The sensors were studied towards Cu2+ with different concentrations using wavelength shift as a result of the interaction between the evanescent field and copper ions. The FBG sensors showed a good response in terms of significant wavelength shift in corresponding to varying Cu2+ concentrations when immersed in aqueous mediums. The sensors exhibited excellent repeatability towards Cu ions.The results demonstrate that the smaller FBG etching diameter, the better optical response in terms of wavelength and linearity. 


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Shaun Mc Brearty ◽  
William Farrelly ◽  
Kevin Curran

In the absence of specialized encryption hardware,cryptographic operations must be performed in main memory.As such,it is common place for cyber criminals to examine the content of main memory with a view to retrieving high-value data in plaintext form and/or the associated decryption key.In this paper,the author presents a number of simple methods for identifying and extracting cryptographic keys from memory dumps of software applications that utilize the Microsoft .NET Framework,as well as sourcecode level countermeasures to protect against same.Given the EXE file of an application and a basic knowledge of the cryptographic libraries utilized in the .NET Framework,the author shows how to create a memory dump of a running application and how to extract cryptographic keys from same using WinDBG - without any prior knowledge of the cryptographic key utilized.Whilst the proof-of-concept application utilized as part of this paper uses an implementation of the DES cipher,it should be noted that the steps shown can be utilized against all three generations of symmetric and asymmetric ciphers supported within the .NET Framework.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Rajesh Shrestha

The Temperature and Humidity plays an important role in keeping our environment stable and balance. So by knowing the values of these parameters, it’d be helpful to study the different aspects of environmental factors like weather forecast, productivity of crops, research industries etc. Therefore, there’s a requirement of the smart system which is fully digital, automated, accurate and capable enough to observe all the environmental parameters with utmost possible accuracy. Besides, it should be cost-effective and portable too. This research work represents the  wired system reduce to wireless system using DHT-11 Sensor, Arduino UNO, HC-05 Bluetooth module, a mobile device and 16x2 Liquid Crystal Display (LCD). The DHT-11 Sensor sensing the data of Temperature and Humidity and transmission of its data using Arduino UNO and HC-05 Bluetooth Module. The mobile device receives the data using Arduino UNO, HC-05 Bluetooth Module and displays it on LCD too. 


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Rajesh Shrestha

Observation of weather plays an important role in our daily life as it reveals the attribute of our surrounding environment. A proper observation of weather can help us to predict the future behaviour of climate. The Temperature, Humidity, Atmospheric Pressure and Altitude are the most important parameters of the environment. If those parameters are known, it will help to select the best crops for specific location which increases the productivity in agricultural field. This is very useful for countries like Nepal where majority population of this country depend on agriculture. With the evaluation of time, a lot of variations have been seen in the methods of measuring those parameters. In this research, an Arduino based device is constructed which measures those parameters and record the data with the indication of time of data recordation. The DHT22 and BMP180 sensors are used for measurement of those parameters whereas RTC and SD Card module is used to record the data in real time. Data can be displayed on LCD and serial monitor of computer or laptop. The data were collected at Tri-Chandra Multiple College, Ghantaghar and at Gaurighat, Chabahil with the help of Arduino based device. These data were compared with data obtained with help of HTC-2 standard device and error analysis has been done.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Benjamin Ashby Smith ◽  
Kevin Curran

Microprocessors such as those found in PCs and smartphones are complex in their design and nature. In recent years, an increasing number of security vulnerabilities have been found within these microprocessors that can leak sensitive user data and information. This report will investigate microarchitecture vulnerabilities focusing on the Spectre and Meltdown exploits and will look at what they do, how they do it and, the real-world impact these vulnerabilities can cause. Additionally, there will be an introduction to the basic concepts of how several PC components operate to support this.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Joseph Williamson ◽  
Kevin Curran

Multi-factor Authentication (MFA) often referred to as Two-factor Authentication (2FA), which is a subset of MFA, is the practice of implementing additional security methods on top of a standard username and password to help authenticate the identity of a user and increase the security of data. This chapter will investigate the problem with username and password logins, the different types of authentication, current best practice for multi-factor authentication and interpretations about how the technology will grow in the upcoming years.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Dylan Rafferty ◽  
Kevin Curran

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information.  In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Ayuba John ◽  
Abdulazeez Yusuf ◽  
Abdulhamid Ardo

The acquisition of data, the processing of those data for use by the operator, and control of remote devices are the fundamental building blocks of all modern utility control systems. Manual calculations, technical analysis and conclusions were initially adopted in power system design, operation and control. As the power system grow it become more complex due to the technical advancements, variety and dynamic requirements. Artificial intelligence is the science of automating intelligent behaviours currently achievable by humans. Intelligent system techniques may be of great help in the implementation of area power system controls. While smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high power converters, modern communications infrastructure, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability, and so on. The big picture of the whole transmission grid, in the context of smart grids, is still unclear; and in Nigeria no studies have been put on ground in order for the existing network to be turn into a smart grid. In this research work emphasis is place on generation and transmission stations; power optimization using artificial intelligent techniques and wireless sensor networks for power control management system.


Sign in / Sign up

Export Citation Format

Share Document