19,301 research outputs found
Lines of Flight: Everyday Resistance along England’s Backbone
The visual and the cultural impact of ‘social industry’ has made a permanent impression on the landscape and on individual minds, whether for ill or for good, particularly in the Peak and Pennines region of northern England. In the current research we examine this impact and consider how both its visible and less apparent effects took hold and how they set in motion an ongoing process of productive/consumptive estrangement from life’s primordial forces, which continue to be alien and obscure, or else appear arcane and overly nostalgic to present-day life. Drawing on the methodology of a short film (incorporating narrative and verse) and using rock climbing as an illustration, we will invoke several, radically dynamic ‘lines of flight’ to open up and articulate an aesthetic appreciation of concrete experience in the fight against coding and to engender a call for action and passion so that we might come to a renewed belief in free activity, which can prompt us, in turn, to think about how we live and work and how we might change things
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing
the data flow through these networks is increasing. These sensor networks allow
for easy-to-apply and flexible installations which have enabled them to be used
for numerous applications. Due to these properties, they face distinct
information security threats. Security of the data flowing through across
networks provides the researchers with an interesting and intriguing potential
for research. Design of these networks to ensure the protection of data faces
the constraints of limited power and processing resources. We provide the
basics of wireless sensor network security to help the researchers and
engineers in better understanding of this applications field. In this chapter,
we will provide the basics of information security with special emphasis on
WSNs. The chapter will also give an overview of the information security
requirements in these networks. Threats to the security of data in WSNs and
some of their counter measures are also presented
Heralded quantum steering over a high-loss channel
Entanglement is the key resource for many long-range quantum information
tasks, including secure communication and fundamental tests of quantum physics.
These tasks require robust verification of shared entanglement, but performing
it over long distances is presently technologically intractable because the
loss through an optical fiber or free-space channel opens up a detection
loophole. We design and experimentally demonstrate a scheme that verifies
entanglement in the presence of at least dB of added loss,
equivalent to approximately km of telecommunication fiber. Our protocol
relies on entanglement swapping to herald the presence of a photon after the
lossy channel, enabling event-ready implementation of quantum steering. This
result overcomes the key barrier in device-independent communication under
realistic high-loss scenarios and in the realization of a quantum repeater.Comment: 8 pages, 5 figure
Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint
2006 Annual Report of the Graduate School of Engineering and Management, Air Force Institute of Technology
The Graduate School\u27s Annual Report highlights research focus areas, new academic programs, faculty accomplishments and news, and provides top-level sponsor-funded research data and information
- …