Intelligent vehicles utilize a combination of video-enabled object detection and radar data to traverse safely through surrounding environments. However, since the most momentary missteps in these systems can cause devastating collisions, the margin of error in the software for these systems is small. In this paper, we hypothesized that a novel object detection system that improves detection accuracy and speed of detection during adverse weather conditions would outperform industry alternatives in an average comparison.
Read More...Browse Articles
Fractals: Exploring Mandelbrot Coordinates and qualitative characteristics of the corresponding Julia Set
Here based on an interest in fractals, the authors used a Julia Set Generator to consider a specific point on the Mandelbrot set with an associated coordinate. In this manner, they found that the complexity of the Mandelbrot and Julia Sets are governed by relatively simple rules, revealing that the intricate patterns of fractals can be defined by defined by simple rules and patterns.
Read More...Understanding the movement of professional and high school soccer players
In this article, the authors use datasets of professional and youth soccer players' movements to map and statistically compare them. Analysis compared movements that led to goals or no-goals and differences between pros and youth.
Read More...Quantitative definition of chemical synthetic pathway complexity of organic compounds
Irrespective of the final application of a molecule, synthetic accessibility is the rate-determining step in discovering and developing novel entities. However, synthetic complexity is challenging to quantify as a single metric, since it is a composite of several measurable metrics, some of which include cost, safety, and availability. Moreover, defining a single synthetic accessibility metric for both natural products and non-natural products poses yet another challenge given the structural distinctions between these two classes of compounds. Here, we propose a model for synthetic accessibility of all chemical compounds, inspired by the Central Limit Theorem, and devise a novel synthetic accessibility metric assessing the overall feasibility of making chemical compounds that has been fitted to a Gaussian distribution.
Read More...A Retrospective Statistical Analysis of Second Primary Cancers in the Delmarva Peninsula, U.S.A.
A significant percentage of cancer survivors develop a second primary cancer. Using data of deceased patients provided by the Peninsula Regional Medical Center, Li and Holdai conducted a retrospective statistical analysis to investigate whether the type of the first cancer affects the occurrence time and type of the second primary cancer.
Read More...Deciphering correlation and causation in risk factors for heart disease with Mendelian randomization
Here, seeking to identify the risk of coronary artery disease (CAD), a major cause of cardiovascular disease, the authors used Mendelian randomization. With this method they identified several traits such as blood pressure readings, LDL cholesterol and BMI as significant risk factors. While other traits were not found to be significant risk factors.
Read More...People’s Preference to Bet on Home Teams Even When Losing is Likely
In this study, the authors investigate situations in which people make sports bets that seem to go against their better judgement. Using surveys, individuals were asked to bet on which team would win in scenarios when their home team was involved and others when they were not to determine whether fandom for a team can overshadow fans’ judgment. They found that fans bet much more on their home teams than neutral teams when their team was facing a large deficit.
Read More...A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...Long-run effects of minimum wage on labor market dynamics
The authors looked at potential downstream effects of raising the minimum wage. Specifically they focused on taxable wages, employment, and firm counts.
Read More...