2,822 research outputs found

    THE ART ATHLETE: A SPORTS BIOMECHANICS PERSPECTIVE

    Get PDF
    Overuse injuries are as much a problem for ‘art athletes’ (dancers and musicians and performing artists generally) as they are for those we more commonly term ‘athletes’. Lower back injuries in male ballet dancers are certainly commonplace. 3D motion analysis in combination with 3D Static Strength Predicting analysis showed that compressive forces at L5/S1 were above the National Institute of Occupational Safety and Health ‘Back Compression Design Limit’ (~ 4,500N) and shear forces were high (~ 530 N) for male dancers performing two commonly used classical lifts. A research design for the use of an opto-reflective motion analysis (Vicon) to investigate shoulder joint loading in cellists and violinists will also be presented

    BALLET DANCER INJURIES DURING PERFORMANCE AND REHEARSAL ON VARIED DANCE SURFACES

    Get PDF
    Three dance surfaces regularly used by a professional touring ballet company (n=60) were quantified using standard sports surface testing apparatus. Surface sub-structure construction varied between surfaces and a range of surface force reduction values were reported. Injuries and associated variables occurring within the ballet company were recorded by the company medical staff. An injury was recorded if a dancer experienced an incident that restricted the dancer from performing all activities that were required of them for the period 24hrs after the incident. Injuries were delimited to those occurring in the lower limbs or trunk during reported non-lifting dance activity. Analysis of statistical significance was restricted due to a low injury data sample size. However certain trends in the injury data warrant future research. The surface with the highest variability in intra-surface force reduction was associated with the highest injury rates per week, lower limb injuries per week, mean days lost dancing per injury and likelihood of injury per performance day. Variability in intra-surface force reduction may have a stronger association with injury risk than mean surface force reduction magnitudes

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl

    First Results from the CHARA Array. II. A Description of the Instrument

    Full text link
    The CHARA Array is a six 1-m telescope optical/IR interferometric array located on Mount Wilson California, designed and built by the Center for High Angular Resolution Astronomy of Georgia State University. In this paper we describe the main elements of the Array hardware and software control systems as well as the data reduction methods currently being used. Our plans for upgrades in the near future are also described

    [Editorial] Accounting scholarship and management by numbers

    Get PDF
    There is a plethora of indices ranking universities, departments, and individual researchers based on a variety of indices. These invariably include a measurement of research, usually based on a combination of quantity and quality of journal publications. Informal discussions with accounting researchers invariably turns to the question of journal rankings and performance management indicators. Why is this so

    Naturally Rehearsing Passwords

    Full text link
    We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions. In particular, password management relies on assumptions about human memory, e.g., that a user who follows a particular rehearsal schedule will successfully maintain the corresponding memory. These assumptions are informed by research in cognitive science and validated through empirical studies. Given rehearsal requirements and a user's visitation schedule for each account, we use the total number of extra rehearsals that the user would have to do to remember all of his passwords as a measure of the usability of the password scheme. Our usability model leads us to a key observation: password reuse benefits users not only by reducing the number of passwords that the user has to memorize, but more importantly by increasing the natural rehearsal rate for each password. We also present a security model which accounts for the complexity of password management with multiple accounts and associated threats, including online, offline, and plaintext password leak attacks. Observing that current password management schemes are either insecure or unusable, we present Shared Cues--- a new scheme in which the underlying secret is strategically shared across accounts to ensure that most rehearsal requirements are satisfied naturally while simultaneously providing strong security. The construction uses the Chinese Remainder Theorem to achieve these competing goals

    Arthroscopic medial compartment drive-through sign for knee medial collateral ligament complex injuries

    Get PDF
    Acute injuries of the knee medial collateral ligament complex concomitant with anterior cruciate ligament injuries are common. The exact site of the injury may be difficult to diagnose preoperatively on magnetic resonance imaging. This study describes an arthroscopic sign that helps determine the site of the knee medial collateral ligament complex injury. The “medial compartment drive-through sign,” visualized during arthroscopy, is described as an excessive opening of the medial compartment. If this excessive opening is above the meniscus, it corresponds to a femoral-sided injury; conversely, if the excessive opening is below the meniscus, then it is a tibial-sided injury. This allows a precise surgical incision to be made, thereby avoiding extensive approaches and possible wound-related complications
    corecore