The XWand is a novel wireless sensor package that enables styles of natural interaction with intelligent environments. For example, a user may point the wand at a device and control it using simple gestures. The XWand system leverages the intelligence of the ubiquitous computing environment to best determine the user's intention.
Infection-causing bacteria can't hide from researchers at Northern Arizona University, who recently helped develop the first diagnostic tool to detect them.
It uses a new high-resolution display technology called electronic paper. This provides you with a crisp black-and-white screen that eliminates glare and can be easily read even in bright sunlight. The screen never gets hot, allowing you to read for as long as you like.
Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It's intended for artists, designers, hobbyists, and anyone interested in creating interactive objects or environments.
Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators. The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) and the Arduino development environment (based on Processing). Arduino projects can be stand-alone or they can communicate with software on running on a computer (e.g. Flash, Processing, MaxMSP).
The boards can be built by hand or purchased preassembled; the software can be downloaded for free. The hardware reference designs (CAD files) are available under an open-source license, you are free to adapt them to your needs.
This device can do almost anything involving almost any kind of low-(~125 kHz) or high-(~13.56 MHz) frequency RFID tag. It can act as a reader. It can eavesdrop on a transaction between another reader and a tag. It can analyze the signal received over the air more closely, for example to perform an attack in which we derive information from the tag's instantaneous power consumption. It can pretend to be a tag itself. It is also capable of some less obviously useful operations that might come in handy for development work.
It can act as a reader. It can eavesdrop on a transaction between another reader and a tag. It can analyze the signal received over the air more closely, for example to perform an attack in which we derive information from the tag's instantaneous power consumption. It can pretend to be a tag itself. It is also capable of some less obviously useful operations that might come in handy for development work.
K. Witte, and K. Geussen. Ganzheitliches, regelbasiertes Verfügbarkeitsmanagement von Produktionssystemen (VeraPro), volume 2 of Verfügbarkeit von Produktionssystemen als Dienstleistung, chapter 9, Apprimus, Aachen, (2009)
J. Wan, I. Humar, and D. Zhang (Eds.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer, Cham, (2016)