Feeds

Boffins power wearable tech with body static

Fondle your phone for free electricity, thanks to the power of polydimethylsiloxane!

Secure remote control for conventional and virtual desktops

A group of Chinese researchers reckon they're close to a practical method of harvesting the static electricity you generate when tapping and swiping the screen of your smartphone as backup power for the phone itself.

As anyone who's jumped back swearing at their hand when all they wanted to do was open a door in the office can attest, the human body can build up a quite considerable static charges. Turning it into useful electricity, however, is a little more challenging.

A problem this research team, led by Peking University's Bo Meng, is trying to address is to make the generator efficient without requiring that it be grounded to earth.

In this paper at Applied Physics Letters, they outline their approach, in which rather than grounding their STEG (single-friction-surface triboelectric generator), the body is used as an electrode, as per this circuit diagram:

Bo Meng's triboelectric generator

(a) STEG with human body conduit and (b) the STEG with grounded

electrode when finger taps the friction surface donates electrons.

Image: Applied Physics Letters, 2014

As they write in their paper:

“When finger taps the friction surface and separates, the two contact surfaces compose a friction pair and get electrostatically charged owing to the difference in electron-attracting abilities ... finger skin shows a tendency to donate electrons in contact electrification. After electrostatically charged, it operates similarly as an out-of-plane gap closing electrostatic generator. Under repeated tapping and separating cycles, charge moves forward and back between the induction electrode and the charged finger skin via the external loads.”

Using a surface of micro-patterned polydimethylsiloxane, the researchers claim they were able to achieve an output voltage of 200V with a current density of 4.7 micro-Amps per square centimetre. That's not about to replace the battery on your laptop computer, but the researchers say “the STEG could be a potential power source for low-power electronics, especially for wearable devices”. ®

Internet Security Threat Report 2014

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Post-pub nosh neckfiller: The MIGHTY Scotch egg
Off to the boozer? This delicacy might help mitigate the effects
I'M SO SORRY, sobs Rosetta Brit boffin in 'sexist' sexy shirt storm
'He is just being himself' says proud mum of larger-than-life physicist
NASA launches new climate model at SC14
75 days of supercomputing later ...
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.