• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Difference in Internal and External Workloads Between Non-Injured and Injured Groups in Collegiate Female Soccer Players

Ishida, Ai, Beaumont, Joshua S. 01 January 2020 (has links)
This is an open access article under CC BY license (https://creativecommons.org/licenses/by/4.0/) Background: Effects of internal and external workloads (IL, EL) on lower limb soft-tissue injuries (LLSTI) risk in male soccer players has been described, the relationships remain unclear in collegiate female (soccer players. Objective: The purpose was to examine the mean difference in IL and EL in LLSTI between non-injured and injured groups (N-IG and IG). Method: 20 collegiate female soccer players (age: 19.2±1.2years; height: 168.2±7.3cm; body mass: 41.0±17.9kg) were included for 14 week competitive season. IL included average heart rate (Avg-HR) and high heart rate zone. EL included total distance, average speed (Avg-Spd), and high-speed running distance. Injuries were counted if (a) they were LLSTI and muscular/ ligamentous strains or tears and tendon problems, and (b) the players missed more than one match or training session. Acute (7-day simple average) and chronic (21-day simple average) IL and EL were calculated in the IG while the mean of acute (7-day) and chronic (21-day) IL and EL were computed in the NIG. Acute Chronic Workload Ratio (ACWR) was calculated as the ratio of acute and chronic IL and EL. Results: Seven LLSTI occurred over 14 weeks. The acute Avg-HR and ACWR of Avg-Spd were significantly higher in the IG than the N-IG (p=0.001 and 0.024). IL and EL in the IG were placed below or above the mean of the N-IG. Conclusion: LLSTI might occur at high and low workloads in collegiate female soccer players. This may support the use of micro-technology to monitor workload based on individual player’s threshold to reduce LLSTI.
2

Detecting Unauthorized Activity in Lightweight IoT Devices

January 2020 (has links)
abstract: The manufacturing process for electronic systems involves many players, from chip/board design and fabrication to firmware design and installation. In today's global supply chain, any of these steps are prone to interference from rogue players, creating a security risk. Manufactured devices need to be verified to perform only their intended operations since it is not economically feasible to control the supply chain and use only trusted facilities. It is becoming increasingly necessary to trust but verify the received devices both at production and in the field. Unauthorized hardware or firmware modifications, known as Trojans, can steal information, drain the battery, or damage battery-driven embedded systems and lightweight Internet of Things (IoT) devices. Since Trojans may be triggered in the field at an unknown instance, it is essential to detect their presence at run-time. However, it isn't easy to run sophisticated detection algorithms on these devices due to limited computational power and energy, and in some cases, lack of accessibility. Since finding a trusted sample is infeasible in general, the proposed technique is based on self-referencing to remove any effect of environmental or device-to-device variations in the frequency domain. In particular, the self-referencing is achieved by exploiting the band-limited nature of Trojan activity using signal detection theory. When the device enters the test mode, a predefined test application is run on the device repetitively for a known period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operating bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicate the presence of unknown (unauthorized) activity. Hence, the malicious activity can differentiate without using a golden reference or any knowledge of the Trojan activity attributes. The proposed technique's effectiveness is demonstrated through experiments with collecting and processing side-channel signals, such as involuntarily electromagnetic emissions and power consumption, of a wearable electronics prototype and commercial system-on-chip under a variety of practical scenarios. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2020

Page generated in 0.1844 seconds