21,075 research outputs found

    Design and Development of Mobile Games By Cocos2d-X Game Engine

    Get PDF
    Since modern humans have a busy lifestyle, they usually have only limited and short period for rest each day. The purpose of this study is to develop a game for this type of scenario so that people can play this mobile game during their rest period. This game is immediate and brainwashing and a player is allowed to take pauses and resume the game anytime to continue the game at the pauses. Moreover, the operations are simplified so that people of all ages and both sexes can play this game without any problem. The game is programmed to have unlimited levels so that a player can continue playing this game. Upon the end of each level, a player is allowed to buy various types of equipment in order to keep strengthening his/her characters and refreshing the highest score. The development of modern mobile games is much simplified than the earlier days. Various types of game engines and development packages are ready for developers to use so that mobile game development is much simpler. The cocos2d-x game engine is selected in this study as the development environment. It features a convenient animation-making environment and a physics engine so that it is particularly suitable for action role-playing game (ARPG). A new game is created based on Japanese fantasy style and its music and artworks are designed and developed by the researchers in this study. It is a new game that belongs to the research team.     Keywords: Cocos2d-x, Android, action gam

    A Study of the Application of Design By Metaphors to the User Interface of Smartphones

    Get PDF
    The purpose of this study is to integrate user experiences, semiology, and the design by metaphors into user interfaces by experiments. Designs by metaphors are effectively integrated into the user interface of photo retouching apps on smartphones. Problems with the usage of the original interface can be resolved and the quality of product design can be improved. Current photo retouching apps usually come with a complicated user interface that makes users difficult to figure out a straightforward way of using the apps. Users might have less confidence in using the apps and their willingness of using is greatly reduced. The emerging trend of design by metaphors in recent years has resolved the issues that complicate user perception. It also helps designers simplify complicated user interfaces due to the requirement of multiple functions. An effective approach is proposed in this study to help designers create new user interfaces for photo retouching apps by using signs to simplify operation instructions. The resulting visual designs allow users to associate operations with something they are familiar with so that they can comprehend product functions in an effective way. The resulting design is clear at a glance so that users no longer make unintended uses. Moreover, the experiments in study opened a new horizon for the application of design by metaphors to user interfaces. This approach makes designers value product semantics more. As a result, people can enjoy their life in a more convenient and comfortable way.     Keywords: photo retouching app for smartphones, design by metaphors, operational semantics, semiology, user experienc

    Split Fracture: A Complication of Cerclage Wiring of Acute Patellar Fracture

    Get PDF
    Introduction: Iatrogenic patellar fracture is reported as a complication of patella procedures, such as medial patellofemoral ligament reconstruction, reconstruction of the anterior cruciate ligament of the knee using bone-patellar tendon-bone technique, and resurfacing the patella in total knee arthroplasty. Case Presentation: A 65-year-old lady with right patella fracture was treated with open reduction and cerclage wiring. An iatrogenic split fracture was noted during tension of the cerclage wire and was successfully managed by screw fixation of the split fracture. Conclusions: Split fracture is a rare complication of circumferential cerclage wiring of patellar fracture. The surgeon should be aware of the contributing factors in order to avoid this complication

    A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution

    Full text link
    We discuss excess noise contributions of a practical balanced homodyne detector in Gaussian-modulated coherent-state (GMCS) quantum key distribution (QKD). We point out the key generated from the original realistic model of GMCS QKD may not be secure. In our refined realistic model, we take into account excess noise due to the finite bandwidth of the homodyne detector and the fluctuation of the local oscillator. A high speed balanced homodyne detector suitable for GMCS QKD in the telecommunication wavelength region is built and experimentally tested. The 3dB bandwidth of the balanced homodyne detector is found to be 104MHz and its electronic noise level is 13dB below the shot noise at a local oscillator level of 8.5*10^8 photon per pulse. The secure key rate of a GMCS QKD experiment with this homodyne detector is expected to reach Mbits/s over a few kilometers.Comment: 22 pages, 11 figure

    Optimal Capacitive Load Matching of Micro Electret Power Generators

    Get PDF
    This paper presents a model of micro-electret power generators. This model uses two capacitors with fixed charge density and variable area to model the actual micro electret power generator. Simulations of power output with capacitive loads and resistive loads are presented. The power output decreases as the load capacitance increases while it increases as the resistive load increases. To verify the model and simulation results, power output generation experiments are performed and the results confirm the simulation. To collect useful energy from the power generator, a small capacitive load, rather than a resistive load, is required

    A size of ~1 AU for the radio source Sgr A* at the centre of the Milky Way

    Get PDF
    Although it is widely accepted that most galaxies have supermassive black holes (SMBHs) at their centers^{1-3}, concrete proof has proved elusive. Sagittarius A* (Sgr A*)^4, an extremely compact radio source at the center of our Galaxy, is the best candidate for proof^{5-7}, because it is the closest. Previous Very Long Baseline Interferometry (VLBI) observations (at 7mm) have detected that Sgr A* is ~2 astronomical unit (AU) in size^8, but this is still larger than the "shadow" (a remarkably dim inner region encircled by a bright ring) arising from general relativistic effects near the event horizon^9. Moreover, the measured size is wavelength dependent^{10}. Here we report a radio image of Sgr A* at a wavelength of 3.5mm, demonstrating that its size is \~1 AU. When combined with the lower limit on its mass^{11}, the lower limit on the mass density is 6.5x10^{21} Msun pc^{-3}, which provides the most stringent evidence to date that Sgr A* is an SMBH. The power-law relationship between wavelength and intrinsic size (The size is proportional to wavelength^{1.09}), explicitly rules out explanations other than those emission models with stratified structure, which predict a smaller emitting region observed at a shorter radio wavelength.Comment: 18 pages, 4 figure

    Practical Evaluation of Security for Quantum Key Distribution

    Full text link
    Many papers proved the security of quantum key distribution (QKD) system, in the asymptotic framework. The degree of the security has not been discussed in the finite coding-length framework, sufficiently. However, to guarantee any implemented QKD system requires, it is needed to evaluate a protocol with a finite coding-length. For this purpose, we derive a tight upper bound of the eavesdropper's information. This bound is better than existing bounds. We also obtain the exponential rate of the eavesdropper's information. Further, we approximate our bound by using the normal distribution.Comment: The manuscript has been modfie

    Security proof of a three-state quantum key distribution protocol without rotational symmetry

    Get PDF
    Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0_z> and |1_z>, can contribute to key generation and the third state, |+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that these QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result on the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the BB84 protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol; while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column

    Implementation of two-party protocols in the noisy-storage model

    Get PDF
    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down conversion sources. In addition, we analyze a modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030 considering practical aspects, v2: published version, title changed in accordance with PRA guideline
    corecore