252 research outputs found

    Augmented Reality Technician Assistance Program

    Get PDF
    The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a Hololens-enabled field technician. As a wearable computer, the Hololens provides the technician a hands-free advantage over traditional devices, because it’s interface does not use typical input devices such as a mouse and keyboard. The advantage of the Surface Pro is that it allows the expert to mark up instructional images naturally with the stylus, providing better precision for the annotations

    Fermi surface induced lattice distortion in NbTe2_2

    Full text link
    The origin of the monoclinic distortion and domain formation in the quasi two-dimensional layer compound NbTe2_2 is investigated. Angle-resolved photoemission shows that the Fermi surface is pseudogapped over large portions of the Brillouin zone. Ab initio calculation of the electron and phonon bandstructure as well as the static RPA susceptibility lead us to conclude that Fermi surface nesting and electron-phonon coupling play a key role in the lowering of the crystal symmetry and in the formation of the charge density wave phase

    Spatiotemporal expansion of primary progenitor zones in the developing human cerebellum

    Get PDF
    We present histological and molecular analyses of the developing human cerebellum from 30 days after conception to 9 months after birth. Differences in developmental patterns between humans and mice include spatiotemporal expansion of both ventricular and rhombic lip primary progenitor zones to include subventricular zones containing basal progenitors. The human rhombic lip persists longer through cerebellar development than in the mouse and undergoes morphological changes to form a progenitor pool in the posterior lobule, which is not seen in other organisms, not even in the nonhuman primate the macaque. Disruptions in human rhombic lip development are associated with posterior cerebellar vermis hypoplasia and Dandy-Walker malformation. The presence of these species-specific neural progenitor populations refines our insight into human cerebellar developmental disorders

    Spatiotemporal expansion of primary progenitor zones in the developing human cerebellum

    Get PDF
    We present histological and molecular analyses of the developing human cerebellum from 30 days after conception to 9 months after birth. Differences in developmental patterns between humans and mice include spatiotemporal expansion of both ventricular and rhombic lip primary progenitor zones to include subventricular zones containing basal progenitors. The human rhombic lip persists longer through cerebellar development than in the mouse and undergoes morphological changes to form a progenitor pool in the posterior lobule, which is not seen in other organisms, not even in the nonhuman primate the macaque. Disruptions in human rhombic lip development are associated with posterior cerebellar vermis hypoplasia and Dandy-Walker malformation. The presence of these species-specific neural progenitor populations refines our insight into human cerebellar developmental disorders

    UC-Secure CRS Generation for SNARKs

    Get PDF
    Zero-knowledge SNARKs (zk-SNARKs) have recently found various applications in verifiable computation and blockchain applications (Zerocash), but unfortunately they rely on a common reference string (CRS) that has to be generated by a trusted party. A standard suggestion, pursued by Ben Sasson et al. [IEEE S&P, 2015], is to generate CRS via a multi-party protocol. We enhance their CRS-generation protocol to achieve UC-security. This allows to safely compose the CRS-generation protocol with the zk-SNARK in a black-box manner with the insurance that the security of the zk-SNARK is not influenced. Differently from the previous work, the new CRS-generation protocol also avoids the random oracle model which is typically not required by zk-SNARKs themselves. As a case study, we apply the protocol to the state-of-the-art zk-SNARK by Groth [EUROCRYPT, 2016]

    On Concurrently Secure Computation in the Multiple Ideal Query Model

    Full text link
    The multiple ideal query (MIQ) model was introduced by Goyal, Jain and Ostrovsky [Crypto’10] as a relaxed notion of security which allows one to construct concurrently secure protocols in the plain model. The main question relevant to the MIQ model is how many queries must we allow to the ideal world adversary? The importance of the above question stems from the fact that if the answer is positive, then it would enable meaningful security guarantees in many application scenarios, as well as, lead to resolution of long standing open questions such as fully concurrent password based key exchange in the plain model. In this work, we continue the study of the MIQ model and prove severe lower bounds on the number of ideal queries per session. Following are our main results: 1. There exists a two-party functionality that cannot be securely realized in the MIQ model with only a constant number of ideal queries per session. 2. There exists a two-party functionality that cannot be securely realized in the MIQ model by any constant round protocol, with any polynomial number of ideal queries per session. Both of these results are unconditional and even rule out protocols proven secure using
    • …
    corecore