19,301 research outputs found

    Lines of Flight: Everyday Resistance along England’s Backbone

    Get PDF
    The visual and the cultural impact of ‘social industry’ has made a permanent impression on the landscape and on individual minds, whether for ill or for good, particularly in the Peak and Pennines region of northern England. In the current research we examine this impact and consider how both its visible and less apparent effects took hold and how they set in motion an ongoing process of productive/consumptive estrangement from life’s primordial forces, which continue to be alien and obscure, or else appear arcane and overly nostalgic to present-day life. Drawing on the methodology of a short film (incorporating narrative and verse) and using rock climbing as an illustration, we will invoke several, radically dynamic ‘lines of flight’ to open up and articulate an aesthetic appreciation of concrete experience in the fight against coding and to engender a call for action and passion so that we might come to a renewed belief in free activity, which can prompt us, in turn, to think about how we live and work and how we might change things

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Heralded quantum steering over a high-loss channel

    Get PDF
    Entanglement is the key resource for many long-range quantum information tasks, including secure communication and fundamental tests of quantum physics. These tasks require robust verification of shared entanglement, but performing it over long distances is presently technologically intractable because the loss through an optical fiber or free-space channel opens up a detection loophole. We design and experimentally demonstrate a scheme that verifies entanglement in the presence of at least 14.8±0.114.8\pm0.1 dB of added loss, equivalent to approximately 8080 km of telecommunication fiber. Our protocol relies on entanglement swapping to herald the presence of a photon after the lossy channel, enabling event-ready implementation of quantum steering. This result overcomes the key barrier in device-independent communication under realistic high-loss scenarios and in the realization of a quantum repeater.Comment: 8 pages, 5 figure

    Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience

    Get PDF
    Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks. This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint

    2006 Annual Report of the Graduate School of Engineering and Management, Air Force Institute of Technology

    Get PDF
    The Graduate School\u27s Annual Report highlights research focus areas, new academic programs, faculty accomplishments and news, and provides top-level sponsor-funded research data and information

    The Economics of Safety

    Get PDF
    corecore