29 research outputs found

    Statistical analysis to develop a three-dimensional surface model of a midsize-male foot

    Full text link
    A representative midsize-male foot was generated via a statistical analysis of foot scans from 107 men with widely varying body size. Seventy-two surface landmarks were manually extracted from the original scan data. A template fitting method was used to represent each scan with a homologous mesh. A principal component analysis and least-squares linear regression were used to generate a foot surface model with landmarks using a reference stature of 1755 mm and a body mass of 83.19 kg. The statistical model can be used to generate a wide range of male foot sizes and shapes.US Army Tank Automotive Research, Development, and Engineering Center (TARDEC)http://deepblue.lib.umich.edu/bitstream/2027.42/116596/1/103232.pdfDescription of 103232.pdf : Final repor

    Intermedial Relationships of Radio Features with Denis Mitchell’s and Philip Donnellan’s Early Television Documentaries

    Get PDF
    Writing of the closure in early 1965 of the Radio Features Department, Asa Briggs identifies one of the reasons for the controversial decision as ‘the incursion of television, which was developing its own features.’ ‘[Laurence] Gilliam and his closest colleagues believed in the unique merits of “pure radio”. The screen seemed a barrier’ (The History of Broadcasting in the United Kingdom, Vol. 5, p. 348). Rather than the screen being ‘a barrier’ for them, a number of the creators of the emerging television documentary were from the late 1950s onwards able to transfer and transform distinctive techniques of ‘pure radio’ into highly effective visual forms. Two key figures were the producers of ‘poetic’ documentaries Denis Mitchell and Philip Donnellan, who employed layered voices, imaginative deployments of music and effects, and allusive juxtapositions of sound and image, to develop an alternative (although always marginal) tradition to the supposedly objective approaches of current affairs and, later, veritĂ© filmmakers. And a dozen years after the dismemberment of the Features Department, Donnellan paid tribute to it in his glorious but little-seen film Pure Radio (BBC1, 3 November 1977). Taking important early films by Mitchell and Donnellan as case studies, this paper explores the impact of radio features on television documentaries in the 1950s and early 1960s, and assesses the extent to which the screen in its intermedial relationships with ‘pure radio’ was a barrier or, in the work of certain creators, an augmentation

    Generation of a midsize-male headform by statistical analysis of shape data

    Full text link
    Human surrogates for safety applications, such as crash dummies, are often constructed to represent the mean or average of individuals within a population. Generating accurate mean headforms is particularly challenging, even with three-dimensional (3D) surface measurement technology, because hair limits the ability to accurately represent the shape of the head. This report presents a new midsizemale headform generated using statistical analysis of head dimensions and landmark data, combined with a reference shape obtained by averaging the head shapes of two men close in size to the target stature and body weight. The locations of 26 head and face landmarks from 1747 men were extracted from the 1988 U.S. Army Anthropometric Survey (ANSUR) and registered using a Procrustes superimposition. A linear regression predicted landmark locations as a function of stature and body mass index, using target values of 1755 mm and 27.3 kg/m2. To construct a reference head shape, two bald men whose head and face dimensions were within 2% of the target mean values were extracted from a large database of head scans. The scans were visually aligned using landmark locations, then resampled cylindrically and averaged. The reference head shape was then morphed to match the target landmark locations using a radial-basisfunction (RBF) morphing method with a multiquadric kernel. A second morphing step was performed to match the desired head length, head breadth, and the distance from the tragion landmarks to the top of the head. In contrast with headforms obtained solely by averaging individuals close to the desired body size, the current headform is generated from a statistical model that represents a large range of head size and shape, and hence a broad set of statistically consistent headforms can be generated programmatically without additional analysis. Approved for public release.US Army Tank Automotive Research, Development, and Engineering Center (TARDEC)http://deepblue.lib.umich.edu/bitstream/2027.42/116595/1/103233.pdfDescription of 103233.pdf : Final repor

    Zero-Interaction Authentication

    No full text
    Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully address this problem. Such systems ask the user to imbue them with long-term authority for decryption, but that authority can be used by anyone who physically possesses the machine. Forcing the user to frequently reestablish his identity is intrusive, encouraging him to disable encryption

    The Case for Transient Authentication

    No full text
    How does a machine know who is using it? Currently, systems assume that the user typing now is the same person who supplied a password days ago. Such persistent authentication is inappropriate for mobile and ubiquitous systems, because associations between people and devices are fleeting. To address this, we propose transient authentication. In this model, a user wears a small hardware token that authenticates the user to other devices over a short-range, wireless link. This paper presents the four principles of transient authentication, our experience applying the model to a cryptographic file system, and our plans for extending the model to other services and applications

    Ecart, film et intermĂ©dia. Notes sur Re-constructing the Missing Photograph d’Anthony McCall ::une archive collective, 1969-2019

    Get PDF
    A new, inexpensive radiosonde transmitter and receiver system has been developed for measuring wind field inhomogeneities in the planetary boundary layer using multiple simultaneously launched balloons. The radio- sondes use a narrowband-frequency-modulated carrier signal to transmit atmospheric pressure and temperature information to a surface receiver. The pressure and temperature data transmitted by the radiosondes allow their height above the surface to be ascertained. In addition, the radiosondes can be tracked with a photographic camera system to provide the azimuth and elevation angles of the radiosondes during their ascent, so that their three-dimensional horizontal position can be determined. By tracking the spatial separation of the radiosondes over time, horizontal gradients can be derived. The system hardware and results from preliminary tests are described

    USENIX Association

    No full text
    How does a machine know who is using it? Current systems authenticate their users infrequently, and assume the user's identity does not change. Such persistent authentication is inappropriate for mobile and ubiquitous systems, where associations between people and devices are fluid and unpredictable. We solve this problem with Transient Authentication, in which a small hardware token continuously authenticates the user's presence over a short-range, wireless link. We present the four principles underlying Transient Authentication, and describe two techniques for securing applications. Applications can be protected transparently by encrypting in-memory state when the user departs and decrypting this state when the user returns. This technique is effective, requiring just under 10 seconds to protect and restore an entire machine, but indiscriminate. Instead, applications can utilize an API for Transient Authentication, protecting only sensitive state. We describe our ports of three applications---PGP, SSH, and Mozilla---to this API. Mozilla, the most complicated application we have ported, suffers less than 4% overhead in page loads in the worst case, and in typical use can be protected in less than 250 milliseconds
    corecore