252 research outputs found
Augmented Reality Technician Assistance Program
The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a Hololens-enabled field technician. As a wearable computer, the Hololens provides the technician a hands-free advantage over traditional devices, because it’s interface does not use typical input devices such as a mouse and keyboard. The advantage of the Surface Pro is that it allows the expert to mark up instructional images naturally with the stylus, providing better precision for the annotations
Fermi surface induced lattice distortion in NbTe
The origin of the monoclinic distortion and domain formation in the quasi
two-dimensional layer compound NbTe is investigated. Angle-resolved
photoemission shows that the Fermi surface is pseudogapped over large portions
of the Brillouin zone. Ab initio calculation of the electron and phonon
bandstructure as well as the static RPA susceptibility lead us to conclude that
Fermi surface nesting and electron-phonon coupling play a key role in the
lowering of the crystal symmetry and in the formation of the charge density
wave phase
Spatiotemporal expansion of primary progenitor zones in the developing human cerebellum
We present histological and molecular analyses of the developing human cerebellum from 30 days after conception to 9 months after birth. Differences in developmental patterns between humans and mice include spatiotemporal expansion of both ventricular and rhombic lip primary progenitor zones to include subventricular zones containing basal progenitors. The human rhombic lip persists longer through cerebellar development than in the mouse and undergoes morphological changes to form a progenitor pool in the posterior lobule, which is not seen in other organisms, not even in the nonhuman primate the macaque. Disruptions in human rhombic lip development are associated with posterior cerebellar vermis hypoplasia and Dandy-Walker malformation. The presence of these species-specific neural progenitor populations refines our insight into human cerebellar developmental disorders
Spatiotemporal expansion of primary progenitor zones in the developing human cerebellum
We present histological and molecular analyses of the developing human cerebellum from 30 days after conception to 9 months after birth. Differences in developmental patterns between humans and mice include spatiotemporal expansion of both ventricular and rhombic lip primary progenitor zones to include subventricular zones containing basal progenitors. The human rhombic lip persists longer through cerebellar development than in the mouse and undergoes morphological changes to form a progenitor pool in the posterior lobule, which is not seen in other organisms, not even in the nonhuman primate the macaque. Disruptions in human rhombic lip development are associated with posterior cerebellar vermis hypoplasia and Dandy-Walker malformation. The presence of these species-specific neural progenitor populations refines our insight into human cerebellar developmental disorders
UC-Secure CRS Generation for SNARKs
Zero-knowledge SNARKs (zk-SNARKs) have recently found various applications in verifiable computation and blockchain applications (Zerocash), but unfortunately they rely on a common reference string (CRS) that has to be generated by a trusted party. A standard suggestion, pursued by Ben Sasson et al. [IEEE S&P, 2015], is to generate CRS via a multi-party protocol.
We enhance their CRS-generation protocol to achieve UC-security. This allows to safely compose the CRS-generation protocol with the zk-SNARK in a black-box manner with the insurance that the security of the zk-SNARK is not influenced.
Differently from the previous work, the new CRS-generation protocol also avoids the random oracle model which is typically not required by zk-SNARKs themselves. As a case study, we apply the protocol to the state-of-the-art zk-SNARK by Groth [EUROCRYPT, 2016]
Characteristics of dew events in an arid artificial oasis cropland and a sub-humid cropland in China
On Concurrently Secure Computation in the Multiple Ideal Query Model
The multiple ideal query (MIQ) model was introduced by Goyal, Jain and Ostrovsky [Crypto’10] as a relaxed notion of security which allows one to construct concurrently secure protocols in the plain model. The main question relevant to the MIQ model is how many queries must we allow to the ideal world adversary? The importance of the above question stems from the fact that if the answer is positive, then it would enable meaningful security guarantees in many application scenarios, as well as, lead to resolution of long standing open questions such as fully concurrent password based key exchange in the plain model. In this work, we continue the study of the MIQ model and prove severe lower bounds on the number of ideal queries per session. Following are our main results: 1. There exists a two-party functionality that cannot be securely realized in the MIQ model with only a constant number of ideal queries per session. 2. There exists a two-party functionality that cannot be securely realized in the MIQ model by any constant round protocol, with any polynomial number of ideal queries per session. Both of these results are unconditional and even rule out protocols proven secure using
Dependence and Imperialism in India
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/69044/2/10.1177_048661347300500111.pd
- …