3,093 research outputs found

    Human-human haptic collaboration in cyclical Fitts' tasks

    Get PDF
    Understanding how humans assist each other in haptic interaction teams could lead to improved robotic aids to solo human dextrous manipulation. Inspired by experiments reported in Reed et al. (2004), which suggested two-person haptically interacting teams could achieve a lower movement time (MT) than individuals for discrete aiming movements of specified accuracy, we report that two-person teams (dyads) can also achieve lower MT for cyclical, continuous aiming movements. We propose a model, called endpoint compromise, for how the intended endpoints of both subjects' motion combine during haptic interaction; it predicts a ratio of /spl radic/2 between slopes of MT fits for individuals and dyads. This slope ratio prediction is supported by our data

    A qualitative exploration of consumers’ perceived impacts, behavioural reactions, and future reflections of the EU Tobacco Products Directive (2017) as applied to electronic cigarettes

    Get PDF
    Background: Electronic cigarette regulations included in the Tobacco Products Directive (TPD), Article 20, implemented in Europe by May 2017, aimed to improve safety for e-cigarette consumers, and prevent uptake among non-smokers, particularly young people. Before implementation, there were significant concerns from consumers, industry, and some in the scientific community about the potential negative impact of the TPD on people using e-cigarettes to stay stopped from smoking. To date, there is limited evidence on how the TPD has affected consumers. This study aimed to add insight into how consumers perceived and experienced the regulations. Methods: Qualitative data, collected between March 2018 and March 2019, relating to participant views of the TPD were extracted from 160 interviews/extended surveys of e-cigarette consumers as part of a wider study into e-cigarette use trajectories (ECtra study). Data were thematically analysed. Results: Awareness of the TPD amongst consumers was not universal. Participants’ smoking behaviour did not appear to be influenced by the legislation. Participants were reassured by manufacturing regulations and requirements for ingredients labels. Participants responded negatively to changes perceived to cause inconvenience and extra plastic waste. The product restrictions prompted some participants to purchase non-compliant products illegally, potentially putting their safety at risk. Conclusions: E-cigarette regulation should focus on ensuring product safety. Raising awareness of the TPD amongst consumers and smokers could be beneficial

    Techniques development for whale migration tracking

    Get PDF
    Effort leading to the completion of development and fabrication of expansible whale harnesses and whale-carried instrument pods is described, along with details of the gear. Early preparative effort for a January-February 1974 field expedition is reported

    Boneh-Franklin Identity Based Encryption Revisited

    Get PDF
    Contains fulltext : 33216.pdf (preprint version ) (Open Access

    Quantum private queries

    Full text link
    We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the server in possession of the database without revealing which item she retrieved: if the server tries to obtain information on the query, the person querying the database can find it out. Furthermore our protocol ensures perfect data privacy of the database, i.e. the information that the user can retrieve in a single queries is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction both in communication complexity and in running-time computational complexity.Comment: 4 pages, 1 figur

    HardIDX: Practical and Secure Index with SGX

    Get PDF
    Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that are not specifically tailored to the hardware architecture, and are rarely well analyzed for their security (e.g., the impact of side channels). Additionally, existing hardware-based solutions often have a large code footprint in the trusted environment susceptible to software compromises. In this paper we present HardIDX: a hardware-based approach, leveraging Intel's SGX, for search over encrypted data. It implements only the security critical core, i.e., the search functionality, in the trusted environment and resorts to untrusted software for the remainder. HardIDX is deployable as a highly performant encrypted database index: it is logarithmic in the size of the index and searches are performed within a few milliseconds rather than seconds. We formally model and prove the security of our scheme showing that its leakage is equivalent to the best known searchable encryption schemes. Our implementation has a very small code and memory footprint yet still scales to virtually unlimited search index sizes, i.e., size is limited only by the general - non-secure - hardware resources

    Optical detection of the Pictor A jet and tidal tail : evidence against an IC/CMB jet

    Get PDF
    Date of Acceptance: 12/06/2015New images of the FR II radio galaxy Pictor A from the Hubble Space Telescope reveal a previously undiscovered tidal tail, as well as a number of jet knots coinciding with a known X-ray and radio jet. The tidal tail is approximately 5″ wide (3 kpc projected), starting 18″ (12 kpc) from the center of Pictor A, and extends more than 90″ (60 kpc). The knots are part of a jet observed to be about 4′ (160 kpc) long, extending to a bright hotspot. These images are the first optical detections of this jet, and by extracting knot flux densities through three filters, we set constraints on emission models. While the radio and optical flux densities are usually explained by synchrotron emission, there are several emission mechanisms that might be used to explain the X-ray flux densities. Our data rule out Doppler-boosted inverse Compton scattering as a source of the high-energy emission. Instead, we find that the observed emission can be well described by synchrotron emission from electrons with a low-energy index (p ∼ 2) that dominates the radio band, while a high-energy index (p ∼ 3) is needed for the X-ray band and the transition occurs in the optical/infrared band. This model is consistent with a continuous electron injection scenario.Peer reviewedFinal Accepted Versio

    Socioeconomic indicators of health inequalities and female mortality: a nested cohort study within the United Kingdom Collaborative Trial of Ovarian Cancer Screening (UKCTOCS)

    Get PDF
    Evidence is mounting that area-level socioeconomic indicators are important tools for predicting health outcomes. However, few studies have examined these alongside individual-level education. This nested cohort study within the control arm of the United Kingdom Collaborative Trial of Ovarian Cancer Screening (UKCTOCS) assesses the association of mutually adjusted individual (education) and area-level (Index of Multiple Deprivation-IMD 2007) socioeconomic status indicators and all-cause female mortality

    Statistically-secure ORAM with O~(log2n)\tilde{O}(\log^2 n) Overhead

    Full text link
    We demonstrate a simple, statistically secure, ORAM with computational overhead O~(log2n)\tilde{O}(\log^2 n); previous ORAM protocols achieve only computational security (under computational assumptions) or require Ω~(log3n)\tilde{\Omega}(\log^3 n) overheard. An additional benefit of our ORAM is its conceptual simplicity, which makes it easy to implement in both software and (commercially available) hardware. Our construction is based on recent ORAM constructions due to Shi, Chan, Stefanov, and Li (Asiacrypt 2011) and Stefanov and Shi (ArXiv 2012), but with some crucial modifications in the algorithm that simplifies the ORAM and enable our analysis. A central component in our analysis is reducing the analysis of our algorithm to a "supermarket" problem; of independent interest (and of importance to our analysis,) we provide an upper bound on the rate of "upset" customers in the "supermarket" problem
    corecore