14,067 research outputs found
BitTorrent Sync: Network Investigation Methodology
The volume of personal information and data most Internet users find
themselves amassing is ever increasing and the fast pace of the modern world
results in most requiring instant access to their files. Millions of these
users turn to cloud based file synchronisation services, such as Dropbox,
Microsoft Skydrive, Apple iCloud and Google Drive, to enable "always-on" access
to their most up-to-date data from any computer or mobile device with an
Internet connection. The prevalence of recent articles covering various
invasion of privacy issues and data protection breaches in the media has caused
many to review their online security practices with their personal information.
To provide an alternative to cloud based file backup and synchronisation,
BitTorrent Inc. released an alternative cloudless file backup and
synchronisation service, named BitTorrent Sync to alpha testers in April 2013.
BitTorrent Sync's popularity rose dramatically throughout 2013, reaching over
two million active users by the end of the year. This paper outlines a number
of scenarios where the network investigation of the service may prove
invaluable as part of a digital forensic investigation. An investigation
methodology is proposed outlining the required steps involved in retrieving
digital evidence from the network and the results from a proof of concept
investigation are presented.Comment: 9th International Conference on Availability, Reliability and
Security (ARES 2014
Effective action in DSR1 quantum field theory
We present the one-loop effective action of a quantum scalar field with DSR1
space-time symmetry as a sum over field modes. The effective action has real
and imaginary parts and manifest charge conjugation asymmetry, which provides
an alternative theoretical setting to the study of the particle-antiparticle
asymmetry in nature.Comment: 8 page
Assessment of average muscle fiber conduction velocity from surface EMG signals during fatiguing dynamic contractions
Path Integral and the Induction Law
We show how the induction law is correctly used in the path integral
computation of the free particle propagator. The way this primary path integral
example is treated in most textbooks is a little bit missleading.Comment: 5 latex pages, no figure
A Finite Element Model for Describing the Effect of Muscle Shortening on Surface EMG
A finite-element model for the generation of single fiber action potentials in a muscle undergoing various degrees of fiber shortening is developed. The muscle is assumed fusiform with muscle fibers following a curvilinear path described by a Gaussian function. Different degrees of fiber shortening are simulated by changing the parameters of the fiber path and maintaining the volume of the muscle constant. The conductivity tensor is adapted to the muscle fiber orientation. In each point of the volume conductor, the conductivity of the muscle tissue in the direction of the fiber is larger than that in the transversal direction. Thus, the conductivity tensor changes point-by-point with fiber shortening, adapting to the fiber paths. An analytical derivation of the conductivity tensor is provided. The volume conductor is then studied with a finite-element approach using the analytically derived conductivity tensor. Representative simulations of single fiber action potentials with the muscle at different degrees of shortening are presented. It is shown that the geometrical changes in the muscle, which imply changes in the conductivity tensor, determine important variations in action potential shape, thus affecting its amplitude and frequency content. The model provides a new tool for interpreting surface EMG signal features with changes in muscle geometry, as it happens during dynamic contractions
- …
