21 research outputs found
Body image distortion, athletic participation and steroid use by high school students in southwestern Ontario.
This study was designed to explore the degree of use of anabolic steroids by high school students in Southwestern Ontario, Canada. Athletes and nonathletes have reported steroid use, with athletes reporting significantly more use than nonathletes (Anderson, Albect, McKeag, Hough, and McGrew, 1991; Terney and McLain, 1990; and Windsor and Demetru, 1989). Students have been reported to use steroids to improve their athletic performances and appearance (Terney and McLain, 1990; Chung and Moore, 1990; Krowchuk, Anglin, Goodfellow, Stancin, Williams, and Zimel, 1989; Addition Research Foundation, 1989-91) while ignoring the negative side effects associated with steroid use (Struass, 1987; and White, Richardson, Grosshans, Perkins, and Murdock, 1987). The use of steroids by high school students still continues (McFarland, 1991, Terney and McLain, 1990) and there is a need to educate students concerning the drastic side effects of steroid use. (McFarland, 1991 and White et al., 1987). The ratio of potential-actual steroid use between males and females was almost 2 to 1. Also, male athletes reported significantly more potential-actual steroid use than any other group of students. Students reported potential-actual use of steroids for both improving their appearance and sports performance enhancement, although the appearance motive was reported more frequently. Multivariate analyses were used to identify specific correlates of steroid use among the high school students. Results are discussed in terms of health ramifications for the users. Recommendations are made for the early identification of \u27at risk\u27 students and possible ways of preventing abuse of anabolic steroids in high schools. (Abstract shortened by UMI.) Source: Masters Abstracts International, Volume: 32-02, page: 0482. Adviser: Dick Moriarty. Thesis (M.H.K.)--University of Windsor (Canada), 1993
Wolfgang: An Autonomous Mobile Robot for Outdoor Navigation
The goal of this project was to design and implement an autonomous robot capable of competing in the 2019 Intelligent Ground Vehicle Competition. The competition outlined several technical requirements including: lane detection and holding, obstacle avoidance, path planning, and GPS navigation. To achieve these tasks a Husky A100 platform was retrofitted with a more powerful computer and integrated with sensors such as a LIDAR, Camera, Satellite Compass, IMU, and GPS. A software architecture was developed based on Robot Operating System to reliably perceive the course lanes and obstacles, localize the robot through sensor fusion, and guide it through each waypoint
Quitters are Winners: A Program to Reduce Smoking at WPI
There is a need to reduce the number of cigarettes smokers on WPI\u27s campus. Our approach will be to develop a program to assist WPI students in quitting smoking.https://digitalcommons.wpi.edu/gps-posters/1058/thumbnail.jp
Sensitivity and Robustness of Quantum Spin-1/2 Rings to Parameter Uncertainty
Selective transfer of information between spin-1/2 particles arranged in a ring is achieved by optimizing the transfer fidelity over a readout time window via shaping, externally applied, static bias fields. Such static control fields have properties that clash with the expectations of classical control theory. Previous work has shown that there are cases in which the logarithmic differential sensitivity of the transfer fidelity to uncertainty in coupling strength or spillage of the bias field to adjacent spins is minimized by controllers that produce the best fidelity. Here we expand upon these examples and examine cases of both classical and non-classical behavior of logarithmic sensitivity to parameter uncertainty and robustness as measured by the p function for quantum systems. In particular we examine these properties in an 11-spin ring with a single uncertainty in coupling strength or a single bias spillage
Promoting Culture and Traditions of Cumbe Through Tourism
Tourism introduces economic and social incentives to share and preserve a community’s traditions through promotion. In cooperation with La Asociación El Cántaro de Sancapac, this project investigates the progress of tourism implementation within the parochial community of Cumbe. We completed our research in three stages: tourism sustainability, resource documentation, and tourism viability. Through documentation, surveys, and interviews, we found plenty of resources in Cumbe that can be utilized for tourism, a tourist interest in the assets and activities in Cumbe, and how to solicit assistance from government organizations. We provided La Asociación with an archive of documentation, prototypes of promotional materials, a translation manual, and a Facebook page for online promotion
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
MiFare Crypto 1 is a lightweight stream cipher used in London\u27s Oyster card, Netherland\u27s OV-Chipcard, US Boston\u27s CharlieCard,
and in numerous wireless access control and ticketing systems worldwide. Recently, researchers have been able to recover this algorithm by reverse engineering.
We have examined MiFare from the point of view of the so called algebraic attacks . We can recover the full 48-bit key of MiFare algorithm in 200 seconds on a PC, given 1 known IV (from one single encryption).
The security of this cipher is therefore close to zero. This is particularly shocking, given the fact that, according to the Dutch press, 1 billion of MiFare Classic chips are used worldwide,
including in many governmental security systems
The Vehicle, Spring 2007
Table of Contents
She Might Just Take You for GrantedRebecca M. Griffithpage 1
ShwagDarius Juttipage 2
In LoveAmanda Vealepage 9
SubmissiveSarah Ellerpage 10
Wedding SongRebecca M. Griffithpage 11
Why No Ladies and Gentlemen, My Shit Never StinksJacob Fosterpage 13
Death of an English MajorLindsey Durbinpage 14
Summer\u27s PerfumeRebecca M. Griffithpage 15
Gigavolt and ChrisEric Schumacherpage 16
UntitledKris Jonespage 22
Ode to the MuseGreg Harrellpage 23
TenderAmanda Vealepage 24
When the Muses HeaveElizabeth Hoodpage 25
Depression LiftingAmanda Vealepage 26
Red SwordAndrew Deckerpage 27
Warring IdeologyMargaret B. Hamperpage 29
ConfessionGreg Harrellpage 34
A Glass PuzzleBrittany Morganpage 35
Hey MaJacob Fosterpage 36
As July Faded AwayRebecca M. Griffithpage 37
About the LeftoversGina LoBiancopage 38
Me, Myself & ILindsey Durbinpage 39
Iced Parking LotRebecca M. Griffithpage 41
About the Authors
Art Submissions
Mike\u27s Revelation and MikeSean Walkercovers
UntitledChad Navelpage 9
Morning in Tintern AbbeyCarrie Muellerpage 12
WestminsterCarrie Muellerpage 21
A Fighting ChanceOsha Rudduckpage 22
Rooftop SunsetJennifer O\u27Neilpage 25
EIU IVCarrie Muellerpage 28
MandolinOsha Rudduckpage 38
EIU IIICarrie Muellerpage 42https://thekeep.eiu.edu/vehicle/1087/thumbnail.jp
The Vehicle, Spring 2010
Table of Contents
ForgettingRashelle McNairpage 34
MuseMary Lieskepage 35
My CompulsionAshton Tembypage 38
MemoryKate Vandermeerpage 41
Killmercialize MeGreg Petersonpage 42
PenJake Smithpage 46
GrassKate Vandermeerpage 48
Character CreationMary Lieskepage 52
Ring Around TheKim Hunter-Perkinspage 54
The Great Cursive ScareJake Smithpage 55
OpiateDoug Urbanskipage 61
What Happens to Little Girls...Jennifer O\u27Neilpage 63
Poetry
Sunny DaysRyan Poolpage 2
AtlantisDoug Urbanskipage 4
Garbage CityKate Vandermeerpage 6
Fat Girl ThongsKim Hunter-Perkinspage 7
MercilessRosalia Pecorapage 19
ChemistryMary Lieskepage 20
He-Who-Stopped-TalkingJustin Sudkamppage 22
In Which Iris Contemplates a Barren EarthSean Slatterypage 24
At the Bottom of the WorldNick Canadaypage 27
Dogma: Mush!Scott Maypage 28
ThiefMary Lieskepage 29
Prose
Coming HomeDoug Urbanskipage 8
DodoDan Davispage 31
The Poet in the PedestrianScott Maypage 37
Toxic RainJacob Swansonpage 40
What\u27s Your Greatest Fear?Justine Fittonpage 43
Soul VoiceHolly Thomaspage 49
Conversations with a SniperKim Hunter-Perkinspage 56
LettersDaniel Paquinpage 65
Art
San Marcos, MexicoKate Vandermeercover
Contemplation of the World\u27s EndNicholas Giffordpage 18
Little Lady SitsSarah Hadwigerpage 26
MoodAlycia Rockeypage 30
Four Ducks in a RowMegan Mathypage 36
The Daily EasternBen Tillerypage 39
BirdsAlycia Rockeypage 45
March of the BugsMegan Mathypage 47
Mexico Work ExperienceKate Vandermeerpage 53
Feather and JewelsAlycia Rockeypage 60
The ForgottenMegan Mathypage 64
Special Features
Fall 2009-Spring 2010 Vehicle Award Winnerspage 1
James K. Johnson Creative Writing Awardpage 74
Kim Hunter-PerkinsWinning Entries (Poetry)page 75
Clint WalkerWinning Entry (Fiction)page 86
Faculty Spotlight: Professor Jason Brownpage 99
About the Contributorspage 106
About the Editorspage 110https://thekeep.eiu.edu/vehicle/1093/thumbnail.jp
The Vehicle, Spring 2009
Table of Contents
Idyllic Has an EndJustine Fittonpage 28
The RemedyJosh Boykinpage 29
True NatureStephen Garciapage 30
We Are All Eaters of SoulsDan Davispage 31
Scarlet on the WindJustin Sudkamppage 34
IlluminatedRashelle McNairpage 35
Lightning RodKim Hunter-Perkinspage 36
TrialDan Davispage 49
Dear GodKristi Kohlenbergpage 50
A Cheap Metaphor Is What We Have for DeathKeith Stewartpage 51
Sad MoonJennifer O\u27Neilpage 52
The Transported ManStephen Garciapage 61
Divine InsanityGrace Lawrencepage 62
Moonglow MemoriesJustin Sudkamppage 63
Poetry
The Habits of HusbandsKim Hunter-Perkinspage 4
Young AmericanMaria Rhodespage 5
Kevin Doesn\u27t Live Here AnymoreJustine Fittonpage 6
Summer VacationMary Lieskepage 8
PerfectChristie Cheatlepage 9
Hate for OneMiranda Whitepage 10
The Witch\u27s GraveDan Davispage 16
Medicine WomanLindsey Durbinpage 18
Epistle to a BombshellKim Hunter-Perkinspage 19
GuardedAaron Dillardpage 20
Lean and Hungry in YesteryearTim Ernstpage 21
Dirty TearsBrittany Morganpage 27
I Left the Radio OnSerena Heathpage 83
Untitled, for CourtneyKellen Fasnachtpage 84
Ermine DriveStephen Garciapage 85
Prose
TwigDaniel Paquinpage 11
Coyote MoonDan Davispage 22
BloodGretchen Schaiblepage 32
IntroductionSam Sottosantopage 53
The Guitar ManDan Davispage 75
Art
Picasso InspirationAlycia Rockeycover
StageSarah Fairchildpage 37
ConnectedBrittany Morganpage 65
SpringAnthony Travis Shootpage 66
BodhisattvaSarah Fairchildpage 67
What About Love?Justin Sudkamppage 68
Angry MoonJennifer O\u27Neilpage 69
HauntedKellen Fasnachtpage 70
Haiku #1Justin Sudkamppage 72
ImmobileRashelle McNairpage 73
The ChurningJosh Boykinpage 74
The Old Boat DockJosh Boykinpage 79
Saltwater RaindropsTim Ernstpage 80
Slow MotionGrace Lawrencepage 81
Solid AdviceAnthony Travis Shootpage 82
TreeAlycia Rockeypage 38
TireSarah Fairchildpage 39
What to WearKristy Pearsonpage 40
Figure 1Sean Walkerpage 41
GreenhouseAlycia Rockeypage 42
RomeAlycia Rockeypage 43
Me at the Lamp PostElizabeth Surbeckpage 44
Little Miss LizKristy Pearsonpage 45
DoudnaAlycia Rockeypage 46
FlagAlycia Rockeypage 47
Flag ProtestAlycia Rockeypage 48
Features
Note From the EditorRebecca Griffithpage 1
Fall 2008-Spring 2009 Vehicle Award Winnerspage 2
James K. Johnson Creative Writing Awardpage 86
Winning Entry (Nonfiction)Daniel Paquinpage 87
Winning Entries (Poetry)Anthony Travis Shootpage 98
Contributorspage 103https://thekeep.eiu.edu/vehicle/1091/thumbnail.jp
Vector Stream Cipher Instant Key Recovery
Vector Stream Cipher (VSC) is a stream cipher designed by ChaosWare and patented by NICT (formerly CRL), Japanese patents 3030341 and 3455758, US patent 6,668,265. VSC is recommended by the Softbank Technology Corporation for use in high bandwidth and high security applications. In this paper we present a practical attack instantly recovering the entire secret key of the high-speed single-round VSC variants with only 4 known subsequent plaintext blocks showing how all single-round VSC variants can be trivially broken due to their simple algebraic nature. The algorithm presented in this paper cannot break the 8-round VSC, but it can be easily adapted to any particular high-speed single-round VSC variant and extended to break some of the multiple-round VSC variants with very little effort and it may help accelerate other attacks