204 research outputs found

    Flexible test-bed for unusual behavior detection

    Get PDF
    Visual surveillance and activity analysis is an active research field of computer vision. As a result, there are several different algorithms produced for this purpose. To obtain more robust systems it is desirable to integrate the different algorithms. To help achieve this goal, we propose a flexible, distributed software collaboration framework and present a prototype system for automatic event analysis. Copyright 2007 ACM

    Experimental demonstration of the microscopic origin of circular dichroism in two-dimensional metamaterials

    Get PDF
    Optical activity and circular dichroism are fascinating physical phenomena originating from the interaction of light with chiral molecules or other nano objects lacking mirror symmetries in three-dimensional (3D) space. While chiral optical properties are weak in most of naturally occurring materials, they can be engineered and significantly enhanced in synthetic optical media known as chiral metamaterials, where the spatial symmetry of their building blocks is broken on a nanoscale. Although originally discovered in 3D structures, circular dichroism can also emerge in a two-dimensional (2D) metasurface. The origin of the resulting circular dichroism is rather subtle, and is related to non-radiative (Ohmic) dissipation of the constituent metamolecules. Because such dissipation occurs on a nanoscale, this effect has never been experimentally probed and visualized. Using a suite of recently developed nanoscale-measurement tools, we establish that the circular dichroism in a nanostructured metasurface occurs due to handedness-dependent Ohmic heating.ope

    SWiM: Secure Wildcard Pattern Matching From OT Extension

    Get PDF
    Suppose a server holds a long text string and a receiver holds a short pattern string. Secure pattern matching allows the receiver to learn the locations in the long text where the pattern appears, while leaking nothing else to either party besides the length of their inputs. In this work we consider secure wildcard pattern matching WPM, where the receiver\u27s pattern is allowed to contain wildcards that match to any character. We present SWiM, a simple and fast protocol for WPM that is heavily based on oblivious transfer (OT) extension. As such, the protocol requires only a small constant number of public-key operations and otherwise uses only very fast symmetric-key primitives. SWiM is secure against semi-honest adversaries. We implemented a prototype of our protocol to demonstrate its practicality. We can perform WPM on a DNA text (4-character alphabet) of length 10510^5 and pattern of length 10310^3 in just over 2 seconds, which is over two orders of magnitude faster than the state-of-the-art scheme of Baron et al. (SCN 2012)

    Search for Dark Matter Axions with CAST-CAPP

    Full text link
    The CAST-CAPP axion haloscope, operating at CERN inside the CAST dipole magnet, has searched for axions in the 19.74 μ\mueV to 22.47 μ\mueV mass range. The detection concept follows the Sikivie haloscope principle, where Dark Matter axions convert into photons within a resonator immersed in a magnetic field. The CAST-CAPP resonator is an array of four individual rectangular cavities inserted in a strong dipole magnet, phase-matched to maximize the detection sensitivity. Here we report on the data acquired for 4124 h from 2019 to 2021. Each cavity is equipped with a fast frequency tuning mechanism of 10 MHz/min between 4.774 GHz and 5.434 GHz. In the present work, we exclude axion-photon couplings for virialized galactic axions down to gaγγ=8×1014g_{a{\gamma}{\gamma}} = 8 \times {10^{-14}} GeV1GeV^{-1} at the 90% confidence level. The here implemented phase-matching technique also allows for future large-scale upgrades.Comment: 24 pages, 5 figures, Published version available with Open Access at https://www.nature.com/articles/s41467-022-33913-

    Adolescents' involvement in cyber bullying and perceptions of school: the importance of perceived peer acceptance for female adolescents

    Get PDF
    Young people are spending increasing amounts of time using digital technology and, as such, are at great risk of being involved in cyber bullying as a victim, bully, or bully/victim. Despite cyber bullying typically occurring outside the school environment, the impact of being involved in cyber bullying is likely to spill over to school. Fully 285 11- to 15-year-olds (125 male and 160 female, M age = 12.19 years, SD = 1.03) completed measures of cyber bullying involvement, self-esteem, trust, perceived peer acceptance, and perceptions of the value of learning and the importance of school. For young women, involvement in cyber bullying as a victim, bully, or bully/victim negatively predicted perceptions of learning and school, and perceived peer acceptance mediated this relationship. The results indicated that involvement in cyber bullying negatively predicted perceived peer acceptance which, in turn, positively predicted perceptions of learning and school. For young men, fulfilling the bully/victim role negatively predicted perceptions of learning and school. Consequently, for young women in particular, involvement in cyber bullying spills over to impact perceptions of learning. The findings of the current study highlight how stressors external to the school environment can adversely impact young women's perceptions of school and also have implications for the development of interventions designed to ameliorate the effects of cyber bullying
    corecore