80 research outputs found

    Theoretical studies of a hydrogen abstraction tool for nanotechnology

    Get PDF
    In the design of a nanoscale, site-specific hydrogen abstraction tool, the authors suggest the use of an alkynyl radical tip. Using ab initio quantum-chemistry techniques including electron correlation they model the abstraction of hydrogen from dihydrogen, methane, acetylene, benzene and isobutane by the acetylene radical. By conservative estimates, the abstraction barrier is small (less than 7.7 kcal mol^-1) in all cases except for acetylene and zero in the case of isobutane. Thermal vibrations at room temperature should be sufficient to supply the small activation energy. Several methods of creating the radical in a controlled vacuum setting should be feasible. The authors show how nanofabrication processes can be accurately and inexpensively designed in a computational framework

    Secure communications over insecure channels

    Full text link

    Non-Invasive Time-Lapsed Monitoring and Quantification of Engineered Bone-Like Tissue

    Get PDF
    The formation of bone-like tissue from human mesenchymal stem cells (hMSC) cultured in osteogenic medium on silk fibroin scaffolds was monitored and quantified over 44days in culture using non-invasive time-lapsed micro-computed tomography (μCT). Each construct was imaged nine times insitu. From μCT imaging, detailed morphometrical data on bone volume density, surface-to-volume ratio, trabecular thickness, trabecular spacing, and the structure model index and tissue mineral density were obtained. μCT irradiation did not impact the osteogenic performance of hMSCs based on DNA content, alkaline phosphatase activity, and calcium deposition when compared to non-exposed control samples. Bone-like tissue formation initiated at day 10 of the culture with the deposition of small mineralized clusters. Tissue mineral density increased linearly over time. The surface-to-volume ratio of the bone-like tissues converged asymptotically to 26mm−1. Although in vitro formation of bone-like tissue started from clusters, the overall bone volume was not predictable from the time, number, and size of initially formed bone-like clusters. Based on microstructural analysis, the morphometry of the tissue-engineered constructs was found to be in the range of human trabecular bone. In future studies, non-invasive, time-lapsed monitoring may enable researchers to culture tissues in vitro, right until the development of a desired morphology is accomplished. Our data demonstrate the feasibility of qualitatively and quantitatively detailing the spatial and temporal mineralization of bone-like tissue formation in tissue engineerin

    The Software Heritage Graph Dataset: Large-scale Analysis of Public Software Development History

    Get PDF
    International audienceSoftware Heritage is the largest existing public archive of software source code and accompanying development history. It spans more than five billion unique source code files and one billion unique commits , coming from more than 80 million software projects. These software artifacts were retrieved from major collaborative development platforms (e.g., GitHub, GitLab) and package repositories (e.g., PyPI, Debian, NPM), and stored in a uniform representation linking together source code files, directories, commits, and full snapshots of version control systems (VCS) repositories as observed by Software Heritage during periodic crawls. This dataset is unique in terms of accessibility and scale, and allows to explore a number of research questions on the long tail of public software development, instead of solely focusing on "most starred" repositories as it often happens

    SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets

    Get PDF
    With the recent rise of cryptocurrencies' popularity, the security and management of crypto-tokens have become critical. We have witnessed many attacks on users and providers, which have resulted in significant financial losses. To remedy these issues, several wallet solutions have been proposed. However, these solutions often lack either essential security features, usability, or do not allow users to customize their spending rules. In this paper, we propose SmartOTPs, a smart-contract wallet framework that gives a flexible, usable, and secure way of managing crypto-tokens in a self-sovereign fashion. The proposed framework consists of four components (i.e., an authenticator, a client, a hardware wallet, and a smart contract), and it provides 2-factor authentication (2FA) performed in two stages of interaction with the blockchain. To the best of our knowledge, our framework is the first one that utilizes one-time passwords (OTPs) in the setting of the public blockchain. In SmartOTPs, the OTPs are aggregated by a Merkle tree and hash chains whereby for each authentication only a short OTP (e.g., 16B-long) is transferred from the authenticator to the client. Such a novel setting enables us to make a fully air-gapped authenticator by utilizing small QR codes or a few mnemonic words, while additionally offering resilience against quantum cryptanalysis. We have made a proof-of-concept based on the Ethereum platform. Our cost analysis shows that the average cost of a transfer operation is comparable to existing 2FA solutions using smart contracts with multi-signatures

    Automatic Object Segmentation To Support Crisis Management Of Large-scale Events

    Get PDF
    The management of large-scale events with a widely distributed camping area is a special challenge for organisers and security forces and requires both comprehensive preparation and attentive monitoring to ensure the safety of the participants. Crucial to this is the availability of up-to-date situational information, e.g. from remote sensing data. In particular, information on the number and distribution of people is important in the event of a crisis in order to be able to react quickly and effectively manage the corresponding rescue and supply logistics. One way to estimate the number of persons especially at night is to classify the type and size of objects such as tents and vehicles on site and to distinguish between objects with and without a sleeping function. In order to make this information available in a timely manner, an automated situation assessment is required. In this work, we have prepared the first high-quality dataset in order to address the aforementioned challenge which contains aerial images over a large-scale festival of different dates. We investigate the feasibility of this task using Convolutional Neural Networks for instance-wise semantic segmentation and carry out several experiments using the Mask-RCNN algorithm and evaluate the results. Results are promising and indicate the possibility of function-based tent classification as a proof-of-concept. The results and thereof discussions can pave the way for future developments and investigations

    Forking Without Clicking: on How to Identify Software Repository Forks

    Get PDF
    International audienceThe notion of software "fork" has been shifting over time from the (negative) phenomenon of community disagreements that result in the creation of separate development lines and ultimately software products, to the (positive) practice of using distributed version control system (VCS) repositories to collaboratively improve a single product without stepping on each others toes. In both cases the VCS repositories participating in a fork share parts of a common development history. Studies of software forks generally rely on hosting platform metadata, such as GitHub, as the source of truth for what constitutes a fork. These "forge forks" however can only identify as forks repositories that have been created on the platform, e.g., by clicking a "fork" button on the platform user interface. The increased diversity in code hosting platforms (e.g., GitLab) and the habits of significant development communities (e.g., the Linux kernel, which is not primarily hosted on any single platform) call into question the reliability of trusting code hosting platforms to identify forks. Doing so might introduce selection and methodological biases in empirical studies. In this article we explore various definitions of "software forks", trying to capture forking workflows that exist in the real world. We quantify the differences in how many repositories would be identified as forks on GitHub according to the various definitions, confirming that a significant number could be overlooked by only considering forge forks. We study the structure and size of fork networks , observing how they are affected by the proposed definitions and discuss the potential impact on empirical research
    corecore