856 research outputs found

    KINEMATICS ANALYSIS OF THE LOWER EXTREMITY DURING THE TWO-HANDED BACKHAND GROUNDER STROKE AND DRIVE VOLLEY FOR TENNIS PLAYERS

    Get PDF
    The purpose of this study was to discuss the motion characteristics of the X-Factor and the role of stance positioning on backhand tennis swing in drive volley and ground stroke. Three elite female tennis players which are training more than 20 hours per week participated in this study. Motion Analysis System with 10 Eagle Digital inferred high speed cameras at 200Hz were used for this study. This study found that the pre-impact rotation mode did not have consistent pattern, but similar trend can be found between the strokes, with the square timing was close at the impact and more trunk rotations on ground stroke in the follow through In the pre-impact stance setting, the ground stroke will adopt a more closed stance, which may be helpful for the hip joint activity. It is suggested that future studies may increase the parameters of the hip joint to establish the reasons for this technical difference

    KINEMATICS ANALYSIS OF THE UPPER EXTREMITY DURING THE TWOHANDED BACKHAND DRIVE VOLLEY FOR FEMALE TENNIS PLAYERS

    Get PDF
    The purpose of this study was to discuss the motion characteristics of the arms in the two-handed backhand drive volley. Five elite female tennis players participated in this study, their two-handed backhand drive volley strokes were analysed, and all participants are right handed. Motion Analysis System with 10 Eagle Digital inferred high speed cameras at 200Hz were used for this study. The results show a similar elbow and wrist speed strategy in x-axis between two-handed ground stroke and drive volley, our study also found that the rear arm dominates the stroke and mainly provide the topspin that is required for the skill of the drive volley. In order to create better stroke efficiency, the right elbow reached peak velocity first, followed by the right wrist before racket impact with the ball

    Effect of source tampering in the security of quantum cryptography

    Get PDF
    The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum-key-distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV-) quantum communication protocols (e.g., QKD, quantum coin tossing, weak coherent state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV-) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.Comment: 9 pages, 6 figure
    corecore