Off-road wheelchair for developing countries unveiled Explore further The Rowheel system can be fitted to any standard manual wheelchair without modifications to the frame, and is easy and quick to dismantle for wheelchair portability. It looks similar to standard manual wheelchairs. Nasser said a commercial version would use a carbon fiber material for the hub, spoke and wheel rim assembly for lower weight and ease of assembly and dismantling.The design won Nasser the $20,000 grand prize in the Create the Future Design Contest run by the publishers of the NASA Tech Briefs magazine. The annual contest attracts around a thousand product designs from over 50 countries.Nasser is now a NASA engineer working at the Kennedy Space Center in Florida. He is a wheelchair user himself, and like 75 percent of people using wheelchairs, relies on a manual wheelchair. Using a pulling motion transfers the loads to the stronger muscles of the upper back, the biceps in the arms, and posterior deltoids in the shoulders, which increases the occupant’s range and endurance and reduces the chance of stress injuries.The system, invented by Salim Nasser of Merritt Island, Florida, uses a planetary gear system in the center of the wheels that converts the pulling movement of the wheelchair occupant into a forward movement of the chair. The planet carrier motion is attached to the chair frame and a ring gear is attached to the wheel hub fixed in the wheel via spokes. When the occupant pulls the standard rim, which is connected to the planetary system sun gear, the planet gears are engaged, and they in turn engage the ring gear fixed to the wheel hub. The bearings fixed to the inner and outer hub plates have a large bore and small cross-section to allow relative motion between the plates and the hub casings.Nasser developed the wheelchair design as a university project during his time as a student at the Florida International University. Over a four-month period he constructed a working prototype from standard third-party tires, spokes, rims and bearings. The gear system and hubs were specially constructed. (PhysOrg.com) — Wheelchairs have a basic problem because the occupant must push the wheels forward to turn the chair’s wheels, but this action is physically stressful on the anterior deltoid muscles in the shoulder and the triceps and flexor carpi muscles in the arms. Using these smaller and relatively weak muscles can result in muscle and joint pain and degredation, torn rotor cuffs, repetitive stress injury, and carpal tunnel syndrome. Now a new wheelchair, the Rowheel System, uses the much more natural pulling (rowing) motion to move the chair forward. More information: contest.techbriefs.com/compone … /content/article/589 © 2010 PhysOrg.com Citation: Rowheel wheelchair is pulled to move forward (2010, October 8) retrieved 18 August 2019 from https://phys.org/news/2010-10-rowheel-wheelchair.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Month: August 2019
(PhysOrg.com) — In 1974, humans broadcast the first message targeted at extraterrestrial life using the Arecibo radio telescope in Puerto Rico. The message, which was aimed at the globular star cluster M13 located 25,000 light years away, consisted of binary digits that encoded information about our DNA, as well as graphics of a human, our Solar System, and the Arecibo telescope. Since then, humans have sent three other messages to nearby stars and planets (20-69 light-years away). These messages have become more complex and anthropocentric, with music, photographs, and drawings submitted by the public. Now a team of scientists, Dimitra Atri from the University of Kansas, Julia DeMarines from the International Space University in France, and Jacob Haqq-Misra from Pennsylvania State University, has proposed that future attempts of messaging to extraterrestrial intelligence (METI) should follow a standard protocol to maximize communication effectiveness. They think that some of the content of past METI broadcasts, which contain sights and sounds, would likely go unnoticed by extraterrestrials who do not have visual or auditory perception (like some organisms on Earth). Instead, the researchers argue that short, simple messages with minimal anthropocentrism, and which rely on simple physical or mathematical language, have the best chance of success.In their study, which will be published in a future issue of Space Policy, the researchers say that a METI protocol should provide constraints and guidelines for factors such as signal encoding, message length, information content, anthropocentrism, transmission method, and transmission periodicity. Currently, there are three antennas that have the capability of transmitting messages to planets anywhere in our galaxy; these telescopes are located in Arecibo, Puerto Rico; Goldstone, California, US; and Evpatoria, Crimea, Ukraine.The researchers acknowledge the argument of some critics that broadcasting our presence to extraterrestrials is a security risk, since an advanced civilization would likely possess the capability to destroy us. But they note that Earth has been emitting electromagnetic signals into space for nearly 100 years due to the unintended leakage from TVs, telecommunications, and aviation. As the researchers explain, any civilization capable of radio transmission that lies within a radius of 100 light-years could detect our TV and radio, and would already know we’re here.The scientists also emphasize that searching for and attempting to communicate with extraterrestrials is as much about understanding ourselves as it is about finding aliens. Once a protocol is developed, the researchers hope to test it in different human cultures throughout the world in order to minimize cultural bias and make the message as universal as possible. The researchers also plan to create an interactive website at which users can create, send, and decrypt messages to each other that follow the protocol. The researchers explain that, even if most of these messages are never sent into space, they will still allow people from different cultures to better appreciate our human diversity.“In the next few weeks, we will be collaborating with mathematicians and radio astronomers to come up with both the content and mode of communication of the message,” Atri said. “As suggested in the paper, it will not be anthropocentric like previous attempts. Once our collaboration comes up with a protocol, we will create an interactive website to test it globally. Anyone with internet access will be able to suggest his/her own message within the protocol guidelines based on scientific principles. We are also open to suggestions from both the scientific community and the general public for improvements in the protocol. It will be a community effort.” Citation: Scientists suggest protocol for messaging to aliens (2011, February 4) retrieved 18 August 2019 from https://phys.org/news/2011-02-scientists-protocol-messaging-aliens.html Hello, Hello, Earth? More information: Dimitra Atri, Julia DeMarines, and Jacob Haqq-Misra. “A Protocol for Messaging to Extraterrestrial Intelligence.” arXiv:1101.4968v2 [physics.pop-ph] arxiv.org/abs/1101.4968 This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Copyright 2010 PhysOrg.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of PhysOrg.com. Explore further The Arecibo Observatory in Arecibo, Puerto Rico. NAIC – Arecibo Observatory, a facility of the NSF
Vonage makes free Facebook phone call app © 2010 PhysOrg.com Explore further ClickFox reached its conclusions by analyzing support data from North American carriers; after eliminating call data for questions about billing or queries about plan options, the company found that calls for assistance with iPhones were generally handled more expeditiously than those for Blackberry and even more so than for Android calls.ClickFox, though not revealing exact figures noted that the main difference between the types of support were the number of calls that had to be transferred to other support reps, i.e. difficult problems often require the assistance of more than one support rep to get resolved. ClickFox says that the number of transfers for iPhone callers is fewer than for Blackberry users, and far fewer than for Android users.In an interview with InfoWorld, analytics director for ClickFox , Lauren Smith said that Blackberry users cost support carriers a total of $46 million more to support than iPhone users did for their support, while Android users cost theirs $97 million more. ClickFox suggests the disparity is due to the higher degree of difficulty in learning and using the Blackberry and Android phones versus the iPhone, resulting in confused users calling support lines only to find the reps oftentimes confused as well. ClickFox says that while iPhone users typically have their questions or problems resolved on the first call, Blackberry users find themselves transferred to another rep 37% of the time; and Android users get transferred a staggering 77% of the time.This announcement by ClickFox comes at a bad time for Android users as reports from the recent DefCon Hacking conference in Las Vegas, suggest that the Android OS has a flaw in it that allows one app to change the focus of another app without user consent. Worse, the offending app can apparently also disable the Back button, preventing the user from going back to the original app. Security experts say such a flaw, in addition to being annoying, can allow a secondary app to masquerade as the first, setting up the user for a phishing attack. (PhysOrg.com) — ClickFox, a firm that analyzes customer experience when trying to solve problems with their technology has focused its attention on how much work and cost is involved in supporting and troubleshooting problems related to the three main kinds of smartphones; the iPhone, Blackberry and those running Google’s Android OS. They found that iPhone’s are cheaper to support than Blackberry’s and Android phones are the most expensive of all. Citation: Research group shows iPhones cost less to support (2011, August 9) retrieved 18 August 2019 from https://phys.org/news/2011-08-group-iphones.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
© 2011 PhysOrg.com Citation: USB 100W spec will pump up power for juicing tablets, notebooks (2011, August 12) retrieved 18 August 2019 from https://phys.org/news/2011-08-usb-100w-spec-power-juicing.html Explore further Industry Leaders Proposed Superspeed USB 3.0 Specification More information: Press release: www.usb.org/press/USB_Power_De … ry_Specification.pdf (PhysOrg.com) — The USB 3.0 Promoter Group has announced a revised power delivery spec that means significant changes in how consumers will be able to power up tablets, notebooks, and a range of other e-devices. The new spec, designed for backwards compatibility with USB 2.0 and support for USB 3.0, promises to deliver up to 100W of power. It’s that capability–of delivering as high as 100 watts of power—that carries the excitement. The jump from 5W 900mA to 100W 20A is expected to extend the use of USB as an instant connection once the spec is implemented. The USB 3.0 Promoter Group is populated by HP, Intel, Microsoft, Renesas Electronics, ST-Ericsson and Texas Instruments. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. The Group developed the USB 3.0 specification, released in November 2008, supporting speeds up to 4.8 Gbps. That represented a ramp-up approximately 10 times faster than the USB 2.0. The newest effort is far more ambitious. “Building on the rapidly increasing industry momentum for using USB bus power to charge a broad range of mobile devices, the new USB Power Delivery specification extends USB’s cable power delivery capabilities beyond simple battery charging,” said Brad Saunders, the USB 3.0 Promoter Group Chairman. “Charging the battery of a notebook PC, or simply powering that notebook PC while actively using the USB data connection, would be possible,” he stated. “Conceivably, a notebook PC could rely solely on a USB connection for its source of power.”Fundamentally, the USB 3.0 has been facing a tougher reality of a gadget-heavy universe where the 5 W limit has become burdensome for users of devices like the iPAD, which uses closer to 10W. The timeline for the spec has several phases. There is an industry review scheduled for later this year. In mid-September, the Intel Developer Forum in San Francisco will offer more information and plans for a pre-release industry review.A final spec will be sent to the USB Implementers Forum early next year.But one observer, Tutorial Online, tempered the excitement with a note from recent history. “Still, consumers may not see the benefits of the new technology so soon thereafter. Though the USB 3.0 standard was formalized in November 2008, the first consumer products based on USB 3.0 didn’t arrive until early 2010.”
(PhysOrg.com) — A joint U.S./UK research team has found that common encryption techniques are so good that law enforcement, from local to highly resourceful federal agencies, are unable to get at data on a computer hard disk that could be used to prove the guilt of people using the computer to perpetuate crimes. In looking at the current technology, the team, as they describe in their paper published in Digital Investigation, find that if criminals use commonly available hard drive encryption software, law enforcement very often is unable find anything that can be used against them. Contrary to what we all see in the movies and on television, cracking an encrypted drive is not a simple thing; in fact, it’s so difficult that if someone has encrypted their hard drive, there is apparently little law enforcement (or anyone else) can do read the data on the drive. Adding to the frustration, at least on the part of law enforcement, is the fact that they can’t force people to give up their passwords.The authors of the report suggest there are some things law enforcement can do, but they all must happen prior to a drive being buttoned up by encryption. Specifically, they say that law enforcement should stop turning computers off to bring them to another location for study, doing so only causes the need for a password to be entered to read the encrypted data. Also, in some cases, doing so causes the data to be automatically destroyed. Fortunately, there are some tools forensics experts can use to gather data if it sits untouched, such as copying everything in memory to a separate disk. The team also suggests that law enforcement look first to see if the drive has been encrypted before scanning it with their own software, as doing so will likely result in a lot of wasted time.The unfortunate bottom line though, is that the authors openly admit that once the drive is encrypted, there is little to nothing to be done, which a lot of criminals are surely going to be really pleased to hear. The team suggests that the government embark on a research mission of its own to figure out a way to subvert encrypted drives or it will find itself with little reason to bother confiscating computers used by criminals to commit crimes in the future. Citation: Research team finds disk encryption foils law enforcement efforts (2011, November 21) retrieved 18 August 2019 from https://phys.org/news/2011-11-team-disk-encryption-foils-law.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Explore further More information: The growing impact of full disk encryption on digital forensics, Digital Investigation, In Press. doi:10.1016/j.diin.2011.09.005AbstractThe increasing use of full disk encryption (FDE) can significantly hamper digital investigations, potentially preventing access to all digital evidence in a case. The practice of shutting down an evidential computer is not an acceptable technique when dealing with FDE or even volume encryption because it may result in all data on the device being rendered inaccessible for forensic examination. To address this challenge, there is a pressing need for more effective on-scene capabilities to detect and preserve encryption prior to pulling the plug. In addition, to give digital investigators the best chance of obtaining decrypted data in the field, prosecutors need to prepare search warrants with FDE in mind. This paper describes how FDE has hampered past investigations, and how circumventing FDE has benefited certain cases. This paper goes on to provide guidance for gathering items at the crime scene that may be useful for accessing encrypted data, and for performing on-scene forensic acquisitions of live computer systems. These measures increase the chances of acquiring digital evidence in an unencrypted state or capturing an encryption key or passphrase. Some implications for drafting and executing search warrants to dealing with FDE are discussed. © 2011 PhysOrg.com ElcomSoft undoes Apple’s location security fix
Explore further Rapid7, a security company, said it was a zero-day exploit making Internet Explorer 7, 8, and 9 vulnerable on Windows XP, Vista and 7 systems. Computer users can experience attacks if they visit a malicious website, which hands over privileges to the attacker. The attacker can run code of his choice in the context of the user. The attacker can delete or add files or change registry values. Security experts, like Rapid7, are advising business and general consumer users to avoid Internet Explorer until Microsoft issues a patch. Rapid 7 offered advice for Internet users to switch to other browsers such as Chrome or Firefox while waiting for a security update. HD Moore, CSO of Rapid7, said, though, that avoiding the browser might not even be enough, as many applications rely on the IE engine to render HTML. The exploit had already been used by malicious attackers in the wild but Rapid7 on Monday released an exploit module for Metasploit to allow security teams to get closer to the situation. Security experts can use it to simulate attacks that exploit the security flaw in Internet Explorer. They can see if their own corporate networks are vulnerable. Metasploit is a collaboration between the open source community and Rapid7. “We have added the zero-day exploit module to Metasploit to give the security community a way to test if their systems are vulnerable and to develop counter-measures,” according to Rapid7.Security watchers believe that the attacks are being made by the same people who previously figured out how to exploit a vulnerability in Oracle’s Java framework. Security sleuths peg the IE exploits on the China-based group called Nitro, a group that first made news last year when Symantec said they had done their mischief at 48 businesses.Romang said the zero-day season is not over yet. Microsoft said it is investigating reports of the bug. In the near term, as an interim step, Microsoft is urging Windows users to install free software designed to protect the Internet Explorer browser. The tool is called Enhanced Mitigation Experience Toolkit, or EMET. Microsoft says it as designed to help prevent hackers from gaining access to your system. “The toolkit includes several pseudo mitigation technologies aimed at disrupting current exploit techniques,” according to Microsoft. “These pseudo mitigations are not robust enough to stop future exploit techniques, but can help prevent users from being compromised by many of the exploits currently in use.” More information: www.rapid7.com/downloads/metasploit.jspwww.microsoft.com/en-us/downlo … etails.aspx?id=29851 Microsoft releases security patch for Web browser This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Citation: Internet Explorer users are warned against Poison Ivy (2012, September 18) retrieved 18 August 2019 from https://phys.org/news/2012-09-internet-explorer-users-poison-ivy.html (Phys.org)—More than a few Internet Explorer users stand vulnerable to fresh attacks of Poison Ivy. In the latest headline in the “Internet Explorer has a flaw” saga, a security hole in Internet Explorer 7,8, and 9 is being exploited. Attackers can spring a back-door Trojan on an IE browser victim’s computer. The Trojan is known as Poison Ivy. Security researchers say the IE hole is new to them. They say the attacks have already taken place. Eric Romang, a security researcher, spotted the flaw a few days ago and blogged that a potential Microsoft Internet Explorer 7 and 8 zero-day is actually exploited in the wild. © 2012 Phys.org
© 2013 Phys.org (Phys.org) —Stated in scholarly terms, a newly published study says research results suggest that “male web-building spiders employ a phylogenetically conserved vibratory signal to ameliorate the risk of pre-copulatory cannibalism.” Translation: A smaller and weaker male spider needs to rock the web so that the female spider won’t kill him before mating. Journal information: Scientific Reports Male black widows look for well-fed mates Explore further Citation: Shudder action buys time for male spider from being killed (2013, December 20) retrieved 18 August 2019 from https://phys.org/news/2013-12-shudder-action-male-spider.html More information: Male courtship vibrations delay predatory behaviour in female spiders, Scientific Reports 3, Article number: 3557 DOI: 10.1038/srep03557sites.google.com/site/behaviou … /marie-e-herbersteinsites.google.com/site/aewignall/media (a) Waveform of a vibration generated by an adult male shuddering in a female’s web, and (b) waveform of the same shudder in (a) played through an electromagnetic shaker. Credit: Scientific Reports 3, Article number: 3557 doi:10.1038/srep03557 The research was published Thursday in the journal Scientific Reports, by Anne Wignall and Marie Herberstein of Macquarie University in Australia. The paper is titled, “Male courtship vibrations delay predatory behaviour in female spiders.” Specifically, male Argiope spiders produce a “courtship” shudder-like vibration in the web, which seems to lessen their chances of being eaten, but the authors also point out that the action merely may buy some time to cause the larger female just to delay her predatory behavior. The shudder delays female aggression and risk of attack, they said, during the earliest and potentially riskiest stages of courtship. The vibration is interesting in that it solves a major problem for male web-building spiders, as they attempt to court female spiders without being mistaken for prey.The authors discussed their method: “We recorded the courtship shudders of five males in a web using laser vibrometry. To ensure that male courtship shudders would be accurately reproduced in our assays, we compared the vibrations from the original recording, and a recording from the electromagnetic shaker used to artificially generate the stimuli in the experiment. The vibrations matched well between the two sources.”Both authors have an interest in spiders as important models in evolutionary and behavioral research. Wignall, on her web site, noted her interest in understand more about spider courtship:”Male web-building spiders go through an elaborate courtship routine on the female’s web. While lots is understood about what happens after copulation in web-building spiders, there’s very little information yet about what is actually being communicated by the male during courtship, or how courtship has been shaped by the unique ecology of web-building spiders.” Similarly, Herberstein on her site noted spiders as important models in research. “For a long time spiders have been underestimated as intriguing and suitable models for a variety of evolutionary questions.” This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
A dance performance will celebrate the universality of emotions where different dance forms such as Bharatanatyam, the tango and classical ballet will meet to create dynamic harmony and explore the world of universal energy.The second edition of Connections is a collaborative venture between the French Embassy, Institut Francais, and the ministry of culture. The three-day event, beginning Jan 8, will take place at the Sri Ram Centre here.The brain child of Bharatanatyam dancer and choreographer Rukmini Chatterjee, this event is a meeting and coming together of different cultures and art forms. Also Read – ‘Playing Jojo was emotionally exhausting’“I don’t think this is a fusion dance form, but meetings of different art forms where traditional and contemporary dance forms meet and subtle transformation takes place, without changing the original forms,” Chatterjee told IANS.“These performances will revolve around passion and desire and from profane to sacred,” she added.During these performances, the Paris-based danseuse elaborated how different dance forms will explore the world of universal energy and add different nuances of their forms to narrate a story that is rich in passion and desire.For the performance, Chatterjee was in touch with dancers from India and France over the social networking sites. They all are now in the capital to rehearse for the final act.When: January 8 Where: Sri Ram Centre, Mandi House
Uchaan Arts is organising a solo show titled Enlighment of the Buddha by Prince Chand. Enlighment of the Buddha is the artist’s expressions of the wisdom and divinity of Lord Buddha with his particular emphasis on divine light which is the light of highest self-realisation spread through deepest words of spiritual thought on life and reality.The artist sees Buddha as a creative spiritual God head and harnesses artistic tools to get his message across. The artist tried to convey not an image but also certain bhavas — karuna, abhaya, wisdom etc. Buddha is depicted in yogic meditation Dhyani Buddha and is the most popular depiction of Him. Closed eyes of Buddha conveying a serenity and peace. There is a variety of works presented through different metaphors linked with the image of the Buddha. Also Read – ‘Playing Jojo was emotionally exhausting’Uchaan is a group of contemporary artists who believe in representing a broad spectrum of visual language, style and concepts for reaching out to arts community and beyond. The group of artists are groundbreaking contemporary visionaries, young upcoming talents and the masters. The aim is to bring visibility and credibility to the works of deserving talented artists who have been largely overlooked within the mainstream discourse.
Kolkata: Darjeeling, which had always been a favourite summer destination for tourists, is once again set to witness a record footfall during this season, as Kolkata-based tour agencies are seeing an unprecedented number of bookings this year.The tour operators have expressed their gratitude to Chief Minister Mamata Banerjee, whose able leadership has resolved the issues related to Darjeeling. Due to the Gorkhaland agitation, there had been a dip in the tourist footfall in the past one and half years. Also Read – Heavy rain hits traffic, flightsAccording to a tour operator on Lenin Sarani, many people have already placed their bookings for Darjeeling, during Durga Puja. The number has been increased a few times compared to the previous year. Last year, the other hill towns in Himachal Pradesh and Uttarakhand had seen significant influx of tourists from Bengal, as agitation was going on in Darjeeling.”There is always a trend among the Bengalis to go to Darjeeling during the summer and Durga Puja. In the past one and half years, there had been a dip in the tourist flow to the hill station. The situation has become normal now, with people showing interest in Darjeeling again. This has become possible due to the prolonged efforts of our Chief Minister,” one of the officials of the tour operator said. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedPeople from Bengal and other states preferred to go to other hill stations, due to the continued agitation. The agitation had hit tourism hardest in the last year. The worry of the tourists soared after Gorkha Janmukti Morcha (GJM) chief Bimal Gurung warned the tourists to stay away from Darjeeling, causing a serious economic crunch for the traders and hoteliers in the hill station.Things were getting worse as the tourists from Bengal and outside preferred not to visit Darjeeling due to the continuous threats of the GJM chief. The Bengal Chief Minister had lashed out at the GJM chief’s warning to the tourists, by saying ‘asking tourists to keep away amounts to keeping away Goddess Lakshmi’.The hospitality and transport sectors were badly affected as the people deserted one of India’s oldest hill stations. The issue was resolved following prompt and effective action by the Chief Minister and also through implementation of various development schemes in the hill station.A Siliguri-based tour operator said that Darjeeling is expected to see record footfall during this year’s Puja and Christmas. They have already started taking bookings for the Puja holidays in October.