Feeds

Boffins power wearable tech with body static

Fondle your phone for free electricity, thanks to the power of polydimethylsiloxane!

Bridging the IT gap between rising business demands and ageing tools

A group of Chinese researchers reckon they're close to a practical method of harvesting the static electricity you generate when tapping and swiping the screen of your smartphone as backup power for the phone itself.

As anyone who's jumped back swearing at their hand when all they wanted to do was open a door in the office can attest, the human body can build up a quite considerable static charges. Turning it into useful electricity, however, is a little more challenging.

A problem this research team, led by Peking University's Bo Meng, is trying to address is to make the generator efficient without requiring that it be grounded to earth.

In this paper at Applied Physics Letters, they outline their approach, in which rather than grounding their STEG (single-friction-surface triboelectric generator), the body is used as an electrode, as per this circuit diagram:

Bo Meng's triboelectric generator

(a) STEG with human body conduit and (b) the STEG with grounded

electrode when finger taps the friction surface donates electrons.

Image: Applied Physics Letters, 2014

As they write in their paper:

“When finger taps the friction surface and separates, the two contact surfaces compose a friction pair and get electrostatically charged owing to the difference in electron-attracting abilities ... finger skin shows a tendency to donate electrons in contact electrification. After electrostatically charged, it operates similarly as an out-of-plane gap closing electrostatic generator. Under repeated tapping and separating cycles, charge moves forward and back between the induction electrode and the charged finger skin via the external loads.”

Using a surface of micro-patterned polydimethylsiloxane, the researchers claim they were able to achieve an output voltage of 200V with a current density of 4.7 micro-Amps per square centimetre. That's not about to replace the battery on your laptop computer, but the researchers say “the STEG could be a potential power source for low-power electronics, especially for wearable devices”. ®

Mobile application security vulnerability report

More from The Register

next story
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.