Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Active Fog Catcher, Michael Giglio, Carson Hand, William Beechinor, Kai Zhang Jun 2015

Active Fog Catcher, Michael Giglio, Carson Hand, William Beechinor, Kai Zhang

Mechanical Engineering

The active fog catching senior project team has been asked to develop a device that will harvest water from the atmosphere, namely fog, using active means. The project will be centered on maximizing water collection rate, with efficiency as a secondary concern. The final design utilizes a refrigeration system in which fans pull air across the cold evaporators inside of a duct. Water condenses on the evaporators and drain into a collection container. It was decided to focus on maximizing water collection at the cost of efficiency because the feasibility of actively harvesting fog must be proved before trying to …


Design And Fabrication Techniques Of Devices For Embedded Power Active Contact Lens, Errol Heradio Leon Jun 2015

Design And Fabrication Techniques Of Devices For Embedded Power Active Contact Lens, Errol Heradio Leon

Master's Theses

This thesis designed and fabricated various devices that were interfaced to an IC for an active contact lens that notifies the user of an event by detection of an external wireless signal. The contact lens consisted of an embedded antenna providing communication with a 2.4GHz system, as well as inductive charging at an operating frequency of 13.56 MHz. The lens utilized a CBC005 5µAh thin film battery by Cymbet and a manufactured graphene super capacitor as a power source. The custom integrated circuit (IC) was designed using the On Semiconductor CMOS C5 0.6 µm process to manage …


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …