823 research outputs found

    The Data Egg: A new solution to text entry barriers

    Get PDF
    A unit that allows text entry with only one hand has been developed, and holds the promise of allowing computers to be truly portable. It is unique in that it allows operation in any position, freeing the user from the traditional constraints of having to be seated near a desk. This hand held, chord-key-based unit can be used either autonomously for idea capturing, or tethered to a personal computer and used as an auxiliary keyboard. Astronauts, journalists, the bedridden, and anyone else normally barred from using a computer while on the job could also benefit from this form of man-machine interface, which has been dubbed the 'Data Egg'

    Local area network with fault-checking, priorities, and redundant backup

    Get PDF
    This invention is a redundant error detecting and correcting local area networked computer system having a plurality of nodes each including a network connector board within the node for connecting to an interfacing transceiver operably attached to a network cable. There is a first network cable disposed along a path to interconnect the nodes. The first network cable includes a plurality of first interfacing transceivers attached thereto. A second network cable is disposed in parallel with the first cable and, in like manner, includes a plurality of second interfacing transceivers attached thereto. There are a plurality of three position switches each having a signal input, three outputs for individual selective connection to the input, and a control input for receiving signals designating which of the outputs is to be connected to the signal input. Each of the switches includes means for designating a response address for responding to addressed signals appearing at the control input and each of the switches further has its signal input connected to a respective one of the input/output lines from the nodes. Also, one of the three outputs is connected to a repective one of the plurality of first interfacing transceivers. There is master switch control means having an output connected to the control inputs of the plurality of three position switches and an input for receiving directive signals for outputting addressed switch position signals to the three position switches as well as monitor and control computer means having a pair of network connector boards therein connected to respective ones of one of the first interfacing transceivers and one of the second interfacing transceivers and an output connected to the input of the master switch means for monitoring the status of the networked computer system by sending messages to the nodes and receiving and verifying messages therefrom and for sending control signals to the master switch to cause the master switch to cause respective ones of the nodes to use a desired one of the first and second cables for transmitting and receiving messages and for disconnecting desired ones of the nodes from both cables

    Digital camera with apparatus for authentication of images produced from an image file

    Get PDF
    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash

    The trustworthy digital camera: Restoring credibility to the photographic image

    Get PDF
    The increasing sophistication of computers has made digital manipulation of photographic images, as well as other digitally-recorded artifacts such as audio and video, incredibly easy to perform and increasingly difficult to detect. Today, every picture appearing in newspapers and magazines has been digitally altered to some degree, with the severity varying from the trivial (cleaning up 'noise' and removing distracting backgrounds) to the point of deception (articles of clothing removed, heads attached to other people's bodies, and the complete rearrangement of city skylines). As the power, flexibility, and ubiquity of image-altering computers continues to increase, the well-known adage that 'the photography doesn't lie' will continue to become an anachronism. A solution to this problem comes from a concept called digital signatures, which incorporates modern cryptographic techniques to authenticate electronic mail messages. 'Authenticate' in this case means one can be sure that the message has not been altered, and that the sender's identity has not been forged. The technique can serve not only to authenticate images, but also to help the photographer retain and enforce copyright protection when the concept of 'electronic original' is no longer meaningful

    Digital Camera with Apparatus for Authentication of Images Produced from an Image File

    Get PDF
    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included

    Early and rapid prediction of patency of the infarct-related coronary artery by using left ventricular wall thickness as measured by two-dimensional echocardiography

    Get PDF
    AbstractObjectives. The aim of this study was to determine whether echocardiography can distinguish between persistent coronary occlusion and reperfusion.Background. There are no adequate clinical or noninvasive laboratory markers to accurately predict successful reperfusion in an acute myocardial infarction.Methods. In a closed chest swine model, the effect of reperfusion on myocardial wall thickness was studied by comparing a 150-min total coronary artery occlusion (group 1) with 120 min of occlusion followed by 30 min of reperfusion (group 2) in the area of risk as measured by echocardiography. Wall thickness was measured at baseline and at 90 and 150 min.Results. In group 1 (n = 4), there was no appreciable change in mean wall thickness from 90 min to 150 min of occlusion at either end-diastole or end-systole (0.54 ± 0.02 to 0.52 ± 0.03 cm, 0.55 ± 0.03 to 0.54 ± 0.03 cm, respectively; p = NS). In contrast, in group 2 (n = 6), an increase in mean wall thickness from 0.53 ± 0.02 to 0.97 ± 0.05 cm at end-diastole and from 0.56 ± 0.04 to 1.04 ± 0.07 cm at end-systole was found from 90 min of occlusion to 30 min of reperfusion (p < 0.001). Reperfusion resulted. in an increase in wall thickness of 83 ± 11% at end-diastole and 92 ± 17% at end-systole. In contrast, persistent coronary occlusion showed minimal changes of −3.0 ± 5% at end-diastole and −2.0 ± 6% at end-systole.Conclusions. This study confirms the hypothesis that an increase in wall thickness can accurately distinguish between reperfusion and permanent coronary occlusion

    A Chiral N=1 Type I Vacuum in Four Dimensions and Its Heterotic Dual

    Full text link
    In this paper we consider Type I string theory compactified on a Z_7 orbifold. The model has N=1 supersymmetry, a U(4) \otimes U(4) \otimes U(4) \otimes SO(8) gauge group, and chiral matter. There are only D9-branes (for which we discuss tadpole cancellation conditions) in this model corresponding to a perturbative heterotic description in a certain region of the moduli space. We construct the heterotic dual, match the perturbative type I and heterotic tree-level massless spectra via giving certain scalars appropriate vevs, and point out the crucial role of the perturbative superpotential (on the heterotic side) for this matching. The relevant couplings in this superpotential turn out to be non-renormalizable (unlike the Z-orbifold case discussed in Ref [1], where Yukawa couplings sufficed for duality matching). We also discuss the role of the anomalous U(1) gauge symmetry present in both type I and heterotic models. In the perturbative regime we match the (tree-level) moduli spaces of these models. We point out possible generalizations of the Z_3 and Z_7 cases to include D5-branes which would help in understanding non-perturbative five-brane dynamics on the heterotic side.Comment: Revtex 3.0, 23 pages, 1 eps figure (to appear in Phys. Rev. D

    Point of View: What’s in a name?

    Get PDF
    Numerous concerns have been raised about the sustainability of the biomedical research enterprise in the United States. Improving the postdoctoral training experience is seen as a priority in addressing these concerns, but even identifying who the postdocs are is made difficult by the multitude of different job titles they can carry. Here, we summarize the detrimental effects that current employment structures have on training, compensation and benefits for postdocs, and argue that academic research institutions should standardize the categorization and treatment of postdocs. We also present brief case studies of two institutions that have addressed these challenges and can provide models for other institutions attempting to enhance their postdoctoral workforces and improve the sustainability of the biomedical research enterprise

    Outpatient facility-based order variation in combined imaging.

    Get PDF
    OBJECTIVE: Combined computed tomography (CT) occurs when one anatomical area is simultaneously imaged both without and with contrast, or two overlapping anatomical areas are imaged concurrently. While this has been studied in a Traditional Medicare population, it has not been studied in other populations subject to prior authorization. This study explores between-facility variation in ordering and receiving orders to render combined CT in a mixed commercial and Medicare Advantage population. METHODS: Orders for CT abdomen (without/with contrast), CT thorax (without/with contrast), and concurrent CT brain and sinus authorized by a prior authorization company from 2013-2017, pertaining to patients with commercial or Medicare Advantage health plans from one national insurer, were extracted. Orders were issued and rendered by both hospitals and nonhospitals. The analysis was performed separately for each anatomical area in two ways: orders were grouped by ordering facility, and by designated rendering facility. For each facility, the ratio of combined to total orders was calculated, and analysis of variance was used to determine whether there were significant differences in this rate by year. The association between health plan type and combined imaging rates was assessed. RESULTS: Combined rates [ratio±standard deviation] for abdomen, thorax, and brain/sinus were 0.306±0.246, 0.089±0.142, and 0.002±0.01 respectively when the analysis was conducted according to ordering facility, and 0.311±0.178, 0.096±0.113, and 0.001±0.006 when the analysis was conducted according to designated rendering facility. Combined CT abdomen and CT thorax rates decreased monotonically from 2013 to 2017, decreases that were significant (P \u3c .01) regardless of whether orders were grouped by ordering or rendering facility. Combined CT abdomen and CT thorax rates significantly differed between orders pertaining to people with commercial and Medicare Advantage plans. DISCUSSION: Variability was greater when orders were grouped by ordering facility, rather than rendering facility. Health plan type may influence whether a patient receives combined CT
    corecore