2,341 research outputs found
Arthroscopic medial compartment drive-through sign for knee medial collateral ligament complex injuries
Acute injuries of the knee medial collateral ligament complex concomitant with anterior cruciate ligament injuries are common. The exact site of the injury may be difficult to diagnose preoperatively on magnetic resonance imaging. This study describes an arthroscopic sign that helps determine the site of the knee medial collateral ligament complex injury. The “medial compartment drive-through sign,” visualized during arthroscopy, is described as an excessive opening of the medial compartment. If this excessive opening is above the meniscus, it corresponds to a femoral-sided injury; conversely, if the excessive opening is below the meniscus, then it is a tibial-sided injury. This allows a precise surgical incision to be made, thereby avoiding extensive approaches and possible wound-related complications
On the Gold Standard for Security of Universal Steganography
While symmetric-key steganography is quite well understood both in the
information-theoretic and in the computational setting, many fundamental
questions about its public-key counterpart resist persistent attempts to solve
them. The computational model for public-key steganography was proposed by von
Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first
universal public-key stegosystem - i.e. one that works on all channels -
achieving security against replayable chosen-covertext attacks (SS-RCCA) and
asked whether security against non-replayable chosen-covertext attacks (SS-CCA)
is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every
efficiently sampleable channel, but did not achieve universality. He posed the
question whether universality and SS-CCA-security can be achieved
simultaneously. No progress on this question has been achieved since more than
a decade. In our work we solve Hopper's problem in a somehow complete manner:
As our main positive result we design an SS-CCA-secure stegosystem that works
for every memoryless channel. On the other hand, we prove that this result is
the best possible in the context of universal steganography. We provide a
family of 0-memoryless channels - where the already sent documents have only
marginal influence on the current distribution - and prove that no
SS-CCA-secure steganography for this family exists in the standard
non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl
Unravelling thermal-mechanical effects on microstructure evolution under superplastic forming conditions in a near alpha titanium alloy
The superplastic formability of titanium alloys has been extensively exploited by various industries, especially for manufacturing of high value aerospace components. Material's microstructural characteristics, such as grain size and dislocations density, determine superplastic formability during manufacturing process and various constitutive relationships have been proposed to take their effects into consideration in modelling and simulation. However, most existing models do not include all these characteristics in their analyses due to the limitations in characterization techniques. This paper reports the results of a systematic study on the effects of thermal (i.e., static) and mechanical (i.e., dynamic) process parameters on the evolution of dislocations and microstructure, both independently and simultaneously, at superplastic forming regime. The evolution of microstructural phase fraction, grain size, crystallographic texture, and geometrically necessary dislocation (GND) density are investaged over a temperature range of 880–920 °C and under strain rates between 0.0005 and 0.01s−1. The results provide valuable insights into the microstructure evolution during superplastic forming on TA15 titanium alloy and form a basis for future physically based constitutive modelling
First Results from the CHARA Array. II. A Description of the Instrument
The CHARA Array is a six 1-m telescope optical/IR interferometric array
located on Mount Wilson California, designed and built by the Center for High
Angular Resolution Astronomy of Georgia State University. In this paper we
describe the main elements of the Array hardware and software control systems
as well as the data reduction methods currently being used. Our plans for
upgrades in the near future are also described
[Editorial] Accounting scholarship and management by numbers
There is a plethora of indices ranking universities, departments, and individual researchers based on a variety of indices. These invariably include a measurement of research, usually based on a combination of quantity and quality of journal publications. Informal discussions with accounting researchers invariably turns to the question of journal rankings and performance management indicators. Why is this so
Naturally Rehearsing Passwords
We introduce quantitative usability and security models to guide the design
of password management schemes --- systematic strategies to help users create
and remember multiple passwords. In the same way that security proofs in
cryptography are based on complexity-theoretic assumptions (e.g., hardness of
factoring and discrete logarithm), we quantify usability by introducing
usability assumptions. In particular, password management relies on assumptions
about human memory, e.g., that a user who follows a particular rehearsal
schedule will successfully maintain the corresponding memory. These assumptions
are informed by research in cognitive science and validated through empirical
studies. Given rehearsal requirements and a user's visitation schedule for each
account, we use the total number of extra rehearsals that the user would have
to do to remember all of his passwords as a measure of the usability of the
password scheme. Our usability model leads us to a key observation: password
reuse benefits users not only by reducing the number of passwords that the user
has to memorize, but more importantly by increasing the natural rehearsal rate
for each password. We also present a security model which accounts for the
complexity of password management with multiple accounts and associated
threats, including online, offline, and plaintext password leak attacks.
Observing that current password management schemes are either insecure or
unusable, we present Shared Cues--- a new scheme in which the underlying secret
is strategically shared across accounts to ensure that most rehearsal
requirements are satisfied naturally while simultaneously providing strong
security. The construction uses the Chinese Remainder Theorem to achieve these
competing goals
Chord distribution functions of three-dimensional random media: Approximate first-passage times of Gaussian processes
The main result of this paper is a semi-analytic approximation for the chord
distribution functions of three-dimensional models of microstructure derived
from Gaussian random fields. In the simplest case the chord functions are
equivalent to a standard first-passage time problem, i.e., the probability
density governing the time taken by a Gaussian random process to first exceed a
threshold. We obtain an approximation based on the assumption that successive
chords are independent. The result is a generalization of the independent
interval approximation recently used to determine the exponent of persistence
time decay in coarsening. The approximation is easily extended to more general
models based on the intersection and union sets of models generated from the
iso-surfaces of random fields. The chord distribution functions play an
important role in the characterization of random composite and porous
materials. Our results are compared with experimental data obtained from a
three-dimensional image of a porous Fontainebleau sandstone and a
two-dimensional image of a tungsten-silver composite alloy.Comment: 12 pages, 11 figures. Submitted to Phys. Rev.
Identifying the sources driving observed PM2.5 temporal variability over Halifax, Nova Scotia, during BORTAS-B
The source attribution of observed variability of total PM<sub>2.5</sub> concentrations over Halifax, Nova Scotia was investigated between 11 July–26 August 2011 using measurements of PM<sub>2.5</sub> mass and PM<sub>2.5</sub> chemical composition (black carbon, organic matter, anions, cations and 33 elements). This was part of the BORTAS-B (quantifying the impact of BOReal forest fires on Tropospheric oxidants using aircraft and satellites) experiment, which investigated the atmospheric chemistry and transport of seasonal boreal wild fire emissions over eastern Canada in 2011. The US EPA Positive Matrix Factorization (PMF) receptor model was used to determine the average mass (percentage) source contribution over the 45 days, which was estimated to be: Long-Range Transport (LRT) Pollution 1.75 μg m<sup>−3</sup> (47%), LRT Pollution Marine Mixture 1.0 μg m<sup>−3</sup> (27.9%), Vehicles 0.49 μg m<sup>−3</sup> (13.2%), Fugitive Dust 0.23 μg m<sup>−3</sup> (6.3%), Ship Emissions 0.13 μg m<sup>−3</sup> (3.4%) and Refinery 0.081 μg m<sup>−3</sup> (2.2%). The PMF model describes 87% of the observed variability in total PM<sub>2.5</sub> mass (bias = 0.17 and RSME = 1.5 μg m<sup>−3</sup>). The factor identifications are based on chemical markers, and they are supported by air mass back trajectory analysis and local wind direction. Biomass burning plumes, found by other surface and aircraft measurements, were not significant enough to be identified in this analysis. This paper presents the results of the PMF receptor modelling, providing valuable insight into the local and upwind sources impacting surface PM<sub>2.5</sub> in Halifax during the BORTAS-B mission
Quantifying the impact of BOReal forest fires on Tropospheric oxidants over the Atlantic using Aircraft and Satellites (BORTAS) experiment: design, execution and science overview
We describe the design and execution of the BORTAS (Quantifying the impact of BOReal forest fires on Tropospheric oxidants over the Atlantic using Aircraft and Satellites) experiment, which has the overarching objective of understanding the chemical aging of air masses that contain the emission products from seasonal boreal wildfires and how these air masses subsequently impact downwind atmospheric composition. The central focus of the experiment was a two-week deployment of the UK BAe-146-301 Atmospheric Research Aircraft (ARA) over eastern Canada, based out of Halifax, Nova Scotia. Atmospheric ground-based and sonde measurements over Canada and the Azores associated with the planned July 2010 deployment of the ARA, which was postponed by 12 months due to UK-based flights related to the dispersal of material emitted by the Eyjafjallajökull volcano, went ahead and constituted phase A of the experiment. Phase B of BORTAS in July 2011 involved the same atmospheric measurements, but included the ARA, special satellite observations and a more comprehensive ground-based measurement suite. The high-frequency aircraft data provided a comprehensive chemical snapshot of pyrogenic plumes from wildfires, corresponding to photochemical (and physical) ages ranging from 45 sr 10 days, largely by virtue of widespread fires over Northwestern Ontario. Airborne measurements reported a large number of emitted gases including semi-volatile species, some of which have not been been previously reported in pyrogenic plumes, with the corresponding emission ratios agreeing with previous work for common gases. Analysis of the NOy data shows evidence of net ozone production in pyrogenic plumes, controlled by aerosol abundance, which increases as a function of photochemical age. The coordinated ground-based and sonde data provided detailed but spatially limited information that put the aircraft data into context of the longer burning season in the boundary layer. Ground-based measurements of particulate matter smaller than 2.5 μm (PM2.5) over Halifax show that forest fires can on an episodic basis represent a substantial contribution to total surface PM2.5
- …