14,067 research outputs found

    BitTorrent Sync: Network Investigation Methodology

    Full text link
    The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files. Millions of these users turn to cloud based file synchronisation services, such as Dropbox, Microsoft Skydrive, Apple iCloud and Google Drive, to enable "always-on" access to their most up-to-date data from any computer or mobile device with an Internet connection. The prevalence of recent articles covering various invasion of privacy issues and data protection breaches in the media has caused many to review their online security practices with their personal information. To provide an alternative to cloud based file backup and synchronisation, BitTorrent Inc. released an alternative cloudless file backup and synchronisation service, named BitTorrent Sync to alpha testers in April 2013. BitTorrent Sync's popularity rose dramatically throughout 2013, reaching over two million active users by the end of the year. This paper outlines a number of scenarios where the network investigation of the service may prove invaluable as part of a digital forensic investigation. An investigation methodology is proposed outlining the required steps involved in retrieving digital evidence from the network and the results from a proof of concept investigation are presented.Comment: 9th International Conference on Availability, Reliability and Security (ARES 2014

    Effective action in DSR1 quantum field theory

    Full text link
    We present the one-loop effective action of a quantum scalar field with DSR1 space-time symmetry as a sum over field modes. The effective action has real and imaginary parts and manifest charge conjugation asymmetry, which provides an alternative theoretical setting to the study of the particle-antiparticle asymmetry in nature.Comment: 8 page

    Path Integral and the Induction Law

    Full text link
    We show how the induction law is correctly used in the path integral computation of the free particle propagator. The way this primary path integral example is treated in most textbooks is a little bit missleading.Comment: 5 latex pages, no figure

    A Finite Element Model for Describing the Effect of Muscle Shortening on Surface EMG

    Get PDF
    A finite-element model for the generation of single fiber action potentials in a muscle undergoing various degrees of fiber shortening is developed. The muscle is assumed fusiform with muscle fibers following a curvilinear path described by a Gaussian function. Different degrees of fiber shortening are simulated by changing the parameters of the fiber path and maintaining the volume of the muscle constant. The conductivity tensor is adapted to the muscle fiber orientation. In each point of the volume conductor, the conductivity of the muscle tissue in the direction of the fiber is larger than that in the transversal direction. Thus, the conductivity tensor changes point-by-point with fiber shortening, adapting to the fiber paths. An analytical derivation of the conductivity tensor is provided. The volume conductor is then studied with a finite-element approach using the analytically derived conductivity tensor. Representative simulations of single fiber action potentials with the muscle at different degrees of shortening are presented. It is shown that the geometrical changes in the muscle, which imply changes in the conductivity tensor, determine important variations in action potential shape, thus affecting its amplitude and frequency content. The model provides a new tool for interpreting surface EMG signal features with changes in muscle geometry, as it happens during dynamic contractions
    corecore