1,734 research outputs found
Safe-arm slide ejection effect on grenade trajectory
This memorandum reports the effect of the safe-arm slide ejection on the grenade range. The report also suggests a method by which the range may be computed by any interested party which includes the safe-arm slide ejection corrections.prepared by R. Lipp, P. Ireton
Pre-Service Teachers\u27 Growth In Understandings of Best Practice Literacy Instruction Through Paired Course and Field Experience
Illiteracy is on the rise in the United States, and the potential negative impact on today’s struggling reader is devastating. Now more than ever, preparing pre-service teachers to be effective teachers of literacy is crucial. This study examined the growth in understandings of best practice literacy of eleven pre-service teachers through paired course and field work. Results reveal that through paired course and field work, growth of best practice literacy instruction is shown by pre-service teachers’ enhanced abilities to define, assign importance, and relate to implications for student learning as well as develop efficacy around their use. Results of this research have an impact on teacher preparation programs and highlight the importance of engaging pre-service teachers in literacy experiences that are connected to the course and field to better prepare them to meet the challenges of ensuring all students grow to be literate individuals
The spider does not always win the fight for attention: Disengagement from threat is modulated by goal set
Stimulus-driven preferential attention to threat can be modulated by goal-driven attention. However, it remains unclear how this goal-driven modulation affects specific attentional components implied in threat interference. We hypothesise that goal-driven modulation most strongly impacts delayed disengagement from threat. A spatial cueing task was used that disentangles delayed disengagement from attentional capture by tightly manipulating the locus of attention at the time of target onset. Different top-down goals were induced by instructing participants to identify bird/fish targets (Experiment 1) or spider/cat targets (Experiment 2) among animal non-targets. Delayed disengagement from a non-target spider was observed only when the spider was part of the target set, not when it was task-irrelevant. This corroborates evidence that threat stimuli do not necessarily override goal-driven attentional control and that extended processing of threatening distractors is not obligatory
Visual search for emotional expressions: Effect of stimulus set on anger and happiness superiority
Prior reports of preferential detection of emotional expressions in visual search have yielded inconsistent results, even for face stimuli that avoid obvious expression-related perceptual confounds. The current study investigated inconsistent reports of anger and happiness superiority effects using face stimuli drawn from the same database. Experiment 1 excluded procedural differences as a potential factor, replicating a happiness superiority effect in a procedure that previously yielded an anger superiority effect. Experiments 2a and 2b confirmed that image colour or poser gender did not account for prior inconsistent findings. Experiments 3a and 3b identified stimulus set as the critical variable, revealing happiness or anger superiority effects for two partially overlapping sets of face stimuli. The current results highlight the critical role of stimulus selection for the observation of happiness or anger superiority effects in visual search even for face stimuli that avoid obvious expression related perceptual confounds and are drawn from a single database
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone
The rapid evolution of Internet-of-Things (IoT) technologies has led to an
emerging need to make it smarter. A variety of applications now run
simultaneously on an ARM-based processor. For example, devices on the edge of
the Internet are provided with higher horsepower to be entrusted with storing,
processing and analyzing data collected from IoT devices. This significantly
improves efficiency and reduces the amount of data that needs to be transported
to the cloud for data processing, analysis and storage. However, commodity OSes
are prone to compromise. Once they are exploited, attackers can access the data
on these devices. Since the data stored and processed on the devices can be
sensitive, left untackled, this is particularly disconcerting.
In this paper, we propose a new system, TrustShadow that shields legacy
applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone
technology and partitions resources into the secure and normal worlds. In the
secure world, TrustShadow constructs a trusted execution environment for
security-critical applications. This trusted environment is maintained by a
lightweight runtime system that coordinates the communication between
applications and the ordinary OS running in the normal world. The runtime
system does not provide system services itself. Rather, it forwards requests
for system services to the ordinary OS, and verifies the correctness of the
responses. To demonstrate the efficiency of this design, we prototyped
TrustShadow on a real chip board with ARM TrustZone support, and evaluated its
performance using both microbenchmarks and real-world applications. We showed
TrustShadow introduces only negligible overhead to real-world applications.Comment: MobiSys 201
FeynGame
A java-based graphical tool for drawing Feynman diagrams is presented. It
differs from similar existing tools in various respects. For example, it is
based on models, consisting of particles (lines) and (optionally) vertices,
each of which can be given their individual properties (line style, color,
arrows, label, etc.). The diagrams can be exported in any standard image
format, or as PDF. Aside from its plain graphical aspect, the goal of FeynGame
is also educative, as it can check a Feynman diagrams validity. This provides
the basis to play games with diagrams, for example. Here we describe on such
game where a given set of initial and final states must be connected through a
Feynman diagram within a given interaction model.Comment: 26 pages, several figures and screenshots. FeynGame is available from
https://gitlab.com/feyngame/FeynGam
- …