856 research outputs found
KINEMATICS ANALYSIS OF THE LOWER EXTREMITY DURING THE TWO-HANDED BACKHAND GROUNDER STROKE AND DRIVE VOLLEY FOR TENNIS PLAYERS
The purpose of this study was to discuss the motion characteristics of the X-Factor and the role of stance positioning on backhand tennis swing in drive volley and ground stroke. Three elite female tennis players which are training more than 20 hours per week participated in this study. Motion Analysis System with 10 Eagle Digital inferred high speed cameras at 200Hz were used for this study. This study found that the pre-impact rotation mode did not have consistent pattern, but similar trend can be found between the strokes, with the square timing was close at the impact and more trunk rotations on ground stroke in the follow through In the pre-impact stance setting, the ground stroke will adopt a more closed stance, which may be helpful for the hip joint activity. It is suggested that future studies may increase the parameters of the hip joint to establish the reasons for this technical difference
KINEMATICS ANALYSIS OF THE UPPER EXTREMITY DURING THE TWOHANDED BACKHAND DRIVE VOLLEY FOR FEMALE TENNIS PLAYERS
The purpose of this study was to discuss the motion characteristics of the arms in the two-handed backhand drive volley. Five elite female tennis players participated in this study, their two-handed backhand drive volley strokes were analysed, and all participants are right handed. Motion Analysis System with 10 Eagle Digital inferred high speed cameras at 200Hz were used for this study. The results show a similar elbow and wrist speed strategy in x-axis between two-handed ground stroke and drive volley, our study also found that the rear arm dominates the stroke and mainly provide the topspin that is required for the skill of the drive volley. In order to create better stroke efficiency, the right elbow reached peak velocity first, followed by the right wrist before racket impact with the ball
Recommended from our members
Neural Correlates of Repetition Priming: A Coordinate-Based Meta-Analysis of fMRI Studies.
Repetition priming is a form of implicit memory, whereby classification or identification of a stimulus is improved by prior presentation of the same stimulus. Repetition priming is accompanied with a deceased fMRI signal for primed vs. unprimed stimuli in various brain regions, often called "repetition suppression," or RS. Previous studies proposed that RS in posterior regions is associated with priming of perceptual processes, whereas RS in more anterior (prefrontal) regions is associated with priming of conceptual processes. To clarify which regions exhibit reliable RS associated with perceptual and conceptual priming, we conducted a quantitative meta-analysis using coordinate-based activation likelihood estimation. This analysis included 65 fMRI studies that (i) employed visual repetition priming during either perceptual or conceptual tasks, (ii) demonstrated behavioral priming, and (iii) reported the results from whole-brain analyses. Our results showed that repetition priming was mainly associated with RS in left inferior frontal gyrus and fusiform gyrus. Importantly, RS in these regions was found for both perceptual and conceptual tasks, and no regions show RS that was selective to one of these tasks. These results question the simple distinction between conceptual and perceptual priming, and suggest consideration of other factors such as stimulus-response bindings
Effect of source tampering in the security of quantum cryptography
The security of source has become an increasingly important issue in quantum
cryptography. Based on the framework of measurement-device-independent
quantum-key-distribution (MDI-QKD), the source becomes the only region
exploitable by a potential eavesdropper (Eve). Phase randomization is a
cornerstone assumption in most discrete-variable (DV-) quantum communication
protocols (e.g., QKD, quantum coin tossing, weak coherent state blind quantum
computing, and so on), and the violation of such an assumption is thus fatal to
the security of those protocols. In this paper, we show a simple quantum
hacking strategy, with commercial and homemade pulsed lasers, by Eve that
allows her to actively tamper with the source and violate such an assumption,
without leaving a trace afterwards. Furthermore, our attack may also be valid
for continuous-variable (CV-) QKD, which is another main class of QKD protocol,
since, excepting the phase random assumption, other parameters (e.g.,
intensity) could also be changed, which directly determine the security of
CV-QKD.Comment: 9 pages, 6 figure
- …