High quality personal exposure data is fundamental to understanding the health implications of household energy interventions, interpreting analyses across assigned study arms, and characterizing ...exposure-response relationships for household air pollution. This paper describes the exposure data collection for the Household Air Pollution Intervention Network (HAPIN), a multicountry randomized controlled trial of liquefied petroleum gas stoves and fuel among 3,200 households in India, Rwanda, Guatemala, and Peru.
The primary objectives of the exposure assessment are to estimate the exposure contrast achieved following a clean fuel intervention and to provide data for analyses of exposure-response relationships across a range of personal exposures.
Exposure measurements are being conducted over the 3-y time frame of the field study. We are measuring fine particulate matter PM
in aerodynamic diameter (
) with the Enhanced Children's MicroPEM™ (RTI International), carbon monoxide (CO) with the USB-EL-CO (Lascar Electronics), and black carbon with the OT21 transmissometer (Magee Scientific) in pregnant women, adult women, and children
of age, primarily via multiple 24-h personal assessments (three, six, and three measurements, respectively) over the course of the 18-month follow-up period using lightweight monitors. For children we are using an indirect measurement approach, combining data from area monitors and locator devices worn by the child. For a subsample (up to 10%) of the study population, we are doubling the frequency of measurements in order to estimate the accuracy of subject-specific typical exposure estimates. In addition, we are conducting ambient air monitoring to help characterize potential contributions of
exposure from background concentration. Stove use monitors (Geocene) are being used to assess compliance with the intervention, given that stove stacking (use of traditional stoves in addition to the intervention gas stove) may occur.
The tools and approaches being used for HAPIN to estimate personal exposures build on previous efforts and take advantage of new technologies. In addition to providing key personal exposure data for this study, we hope the application and learnings from our exposure assessment will help inform future efforts to characterize exposure to household air pollution and for other contexts. https://doi.org/10.1289/EHP6422.
Universal serial bus is put forward by seven corporations which are led by the Intel. It cost lowly, fast and easily expandable. USB is widely used in serial communication interface, widely used in ...computer peripherals and digital products. The USB protocol layer is the core unit of the USB device, which handles most of the contents of the USB protocol provides. This paper studies USB protocol layer design and implementation. Then USB protocol layer is completed based on FPGA.
Significantly increased use of USB devices due to their user‐friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to ...their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances.
This paper proposes a hybrid electronic and magnetic structure named a variable-inverter-rectifier-transformer (VIRT) that enables a transformer with fractional and reconfigurable effective turns ...ratios (e.g., 12:0.5, 12:2/3, 12:1, and 12:2). This functionality is valuable in converters with wide operating voltage ranges and high step-up/down, as it offers a means to reduce the turns count and copper loss within the transformer while also facilitating voltage doubling and quadrupling. These properties are especially beneficial for miniaturizing the transformer stage in many power electronics applications, such as universal serial bus wall chargers. We introduce the principle of operation of the structure and present models for its magnetic and electrical behavior. The instance of VIRT described in this paper comprises four half-bridge switching cells distributed around a planar magnetic core and connected to two "half-turns" wound through that core. By controlling the operating modes of the half-bridge cells, we gain control over the flux paths and current paths used in the transformer, and this hybridization enables fractional and reconfigurable effective turns ratios. An experimental prototype integrates the VIRT with a stacked-bridge LLC converter to accommodate a widely varying input (120-380 V dc ) and output (5-20 V dc ), and VIRT is shown to be highly beneficial in keeping efficiency high over this wide output voltage range.
A number of small, single element radiation detectors, employing the CERN-based Medipix2 Collaboration׳s Timepix Application Specific Integrated Circuit (ASIC) coupled to a specially modified version ...of the USB-Lite interface for that ASIC provided by the Institute for Experimental and Applied Physics (IEAP) at the Czech Technical University in Prague, have been developed at the University of Houston and NASA Johnson Space Center. These detectors, officially designated by NASA as Radiation Environment Monitors (REMs), were deployed aboard the International Space Station in late 2012. Six REM units are currently operating on Station Support Computers (SSCs) and returning data on a daily basis. The associated data acquisition software on the SSCs provides both automated data collection and transfer, as well as algorithms to handle adjustment of acquisition rates and recovery and restart of the acquisition software. A suite of ground software analysis tools has been developed to allow rapid analysis of the data and provides a ROOT-based framework for extending data analysis capabilities.
Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the ...connected devices. Hence, a number of organizations and workplaces have prohibited their employees from using USB devices, and there have been efforts to design secure USB storage device schemes to more effectively resist different known security attacks. However, designing such schemes is challenging. For example, in this article we revisit the Wei et al.'s scheme, and demonstrate that it is vulnerable to attacks such as password guessing and user impersonation. We also explain that the scheme does not verify the correctness of user's input in the login phase, which is another design flaw. Then, we present an improved scheme and prove it secure in the random oracle model.
Purpose The purpose of this study is to detect the effect of some natural cellulosic polymers in their nano forms with the addition of zinc oxide nanoparticles on restoring the lost mechanical ...strength of degraded papyrus without any harmful effects on the inks. Design/methodology/approach In the current study, the USB digital microscopy, scanning electron microscope, measurement of mechanical properties (tensile and elongation), pH measurement, color change and infrared spectroscopy were undertaken for the samples before and after treatment and aging. Findings In the current study, the USB digital microscopy, scanning electron microscope, measurement of mechanical properties (tensile and elongation), pH measurement, color change and infrared spectroscopy were undertaken for the samples before and after treatment and aging. Originality/value The effect of strengthening materials was studied on cellulose and carbon ink, which makes this study closer to reality as the manuscript is the consistent structure of cellulose and inks, whereas most of the literature stated the impact of consolidation materials on the strengthening the cellulosic supports without attention to their impact on inks.
A Technical Report on an Innovative Plan to Migrate from Traditional PCI Card based Control System to USB Port Interfaced Control System that has been Implemented Successfully in an Active ...Synchrotron Beam Line
Attackers increasingly take advantage of innocent users who tend to use USB peripherals casually, assuming these peripherals are benign when in fact they may carry an embedded malicious payload that ...can be used to launch attacks. In recent years, USB peripherals have become an attractive tool for launching cyber-attacks. In this survey, we review 29 different USB-based attacks and utilize our new taxonomy to classify them into four major categories. These attacks target both individuals and organizations; utilize widely used USB peripherals, such as keyboards, mice, flash drives, smartphones etc. For each attack, we address the objective it achieves and identify the associated and vulnerable USB peripherals and hardware.
Automated Teller Machines ATMs are used with one type of approach, usually with cash withdrawals. ATM customers use a lot of ATM facilities and make billions of transactions. In the meantime, Due to ...inadequate of security, the thefts in the ATMs are also disproportionate. The main objective of our analysis is to minimise the number of ATM robberies. N of this assignment, we use the camera to recognise the face. The IR will activate, the buzzer will warn the sound, and the corresponding alert message will be sent to the assigned user if any of the sensors including temperature. In addition, if someone wants to open the money locker, the gas is sprayed on the robber to make him unconscious. This is why a low-value portable Integrated database server primarily based on the ARM11 computer and the Raspberry Pi operating gadget for Linux needs to be put into operation. This configuration is suggested for ATM safety, consisting specifically of door lock modules, internet, sensors and a face-recognition camera. Whenever theft occurs, an infrared sensor is used here that detects the vibration and temperature of the ATM system and takes critical motion. This machine uses the ARM11 controller to process real-time information acquired using the IR sensor, based primarily on the built-in gadget. The details are communicated to the entire master device based on ARM11 until the IR is detected. The DC engine would then be used to shut down the Automated teller machine lock, the circuit will be used to release fuel inside the ATM to deliver the robber to the unconscious point, the GSM modem will send signals to the local police station and the approved person concerned, and the alarm will eventually come from the buzzer. This can deter the robbery, and the man or woman who is involved in the robbery will be without difficulties.