1,734 research outputs found

    The reversible photochemistry of phycorythrocyanin

    Get PDF

    Safe-arm slide ejection effect on grenade trajectory

    Get PDF
    This memorandum reports the effect of the safe-arm slide ejection on the grenade range. The report also suggests a method by which the range may be computed by any interested party which includes the safe-arm slide ejection corrections.prepared by R. Lipp, P. Ireton

    Pre-Service Teachers\u27 Growth In Understandings of Best Practice Literacy Instruction Through Paired Course and Field Experience

    Get PDF
    Illiteracy is on the rise in the United States, and the potential negative impact on today’s struggling reader is devastating. Now more than ever, preparing pre-service teachers to be effective teachers of literacy is crucial. This study examined the growth in understandings of best practice literacy of eleven pre-service teachers through paired course and field work. Results reveal that through paired course and field work, growth of best practice literacy instruction is shown by pre-service teachers’ enhanced abilities to define, assign importance, and relate to implications for student learning as well as develop efficacy around their use. Results of this research have an impact on teacher preparation programs and highlight the importance of engaging pre-service teachers in literacy experiences that are connected to the course and field to better prepare them to meet the challenges of ensuring all students grow to be literate individuals

    The spider does not always win the fight for attention: Disengagement from threat is modulated by goal set

    Get PDF
    Stimulus-driven preferential attention to threat can be modulated by goal-driven attention. However, it remains unclear how this goal-driven modulation affects specific attentional components implied in threat interference. We hypothesise that goal-driven modulation most strongly impacts delayed disengagement from threat. A spatial cueing task was used that disentangles delayed disengagement from attentional capture by tightly manipulating the locus of attention at the time of target onset. Different top-down goals were induced by instructing participants to identify bird/fish targets (Experiment 1) or spider/cat targets (Experiment 2) among animal non-targets. Delayed disengagement from a non-target spider was observed only when the spider was part of the target set, not when it was task-irrelevant. This corroborates evidence that threat stimuli do not necessarily override goal-driven attentional control and that extended processing of threatening distractors is not obligatory

    Visual search for emotional expressions: Effect of stimulus set on anger and happiness superiority

    Get PDF
    Prior reports of preferential detection of emotional expressions in visual search have yielded inconsistent results, even for face stimuli that avoid obvious expression-related perceptual confounds. The current study investigated inconsistent reports of anger and happiness superiority effects using face stimuli drawn from the same database. Experiment 1 excluded procedural differences as a potential factor, replicating a happiness superiority effect in a procedure that previously yielded an anger superiority effect. Experiments 2a and 2b confirmed that image colour or poser gender did not account for prior inconsistent findings. Experiments 3a and 3b identified stimulus set as the critical variable, revealing happiness or anger superiority effects for two partially overlapping sets of face stimuli. The current results highlight the critical role of stimulus selection for the observation of happiness or anger superiority effects in visual search even for face stimuli that avoid obvious expression related perceptual confounds and are drawn from a single database

    Detailed Numerical Simulation of Droplet Combustion

    Get PDF

    TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

    Full text link
    The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.Comment: MobiSys 201

    FeynGame

    Full text link
    A java-based graphical tool for drawing Feynman diagrams is presented. It differs from similar existing tools in various respects. For example, it is based on models, consisting of particles (lines) and (optionally) vertices, each of which can be given their individual properties (line style, color, arrows, label, etc.). The diagrams can be exported in any standard image format, or as PDF. Aside from its plain graphical aspect, the goal of FeynGame is also educative, as it can check a Feynman diagrams validity. This provides the basis to play games with diagrams, for example. Here we describe on such game where a given set of initial and final states must be connected through a Feynman diagram within a given interaction model.Comment: 26 pages, several figures and screenshots. FeynGame is available from https://gitlab.com/feyngame/FeynGam
    corecore