Browse Articles

Physical Appearance and Its Effect on Trust

Ledesma et al. | Nov 09, 2020

Physical Appearance and Its Effect on Trust

Do different physical traits affect teenagers’ initial trust of an unknown person? Would they give greater trust to women and people of similar ethnicity? To test these hypotheses, the authors developed a survey to determine the sets of physical characteristics that affect a person's trustworthiness. They found that gender and expression were the main physical traits associated with how trustworthy an individual looks, while ethnicity was also important.

Read More...

Autologous transplantation of fresh ovarian tissue in the ICR mice model

Wang et al. | Oct 24, 2022

Autologous transplantation of fresh ovarian tissue in the ICR mice model

In this study, we performed orthotopic auto-transplantation of fresh ovarian tissues by transplanting unilateral half ovarian tissue to the contralateral ovary in the ICR (Institute of Cancer Research) strain of outbred, heterogeneous mice to determine if the transplanted tissue could be functional. We found that the freshly transplanted mouse ovarian tissue survived and functional, as histochemical and immunofluorescence assays have shown that not only both follicles at different developing stages and corpus luteum are available, but the morphology of them are properly maintained within the transplanted tissue.

Read More...

An improved video fingerprinting attack on users of the Tor network

Srikanth et al. | Mar 31, 2022

An improved video fingerprinting attack on users of the Tor network

The Tor network allows individuals to secure their online identities by encrypting their traffic, however it is vulnerable to fingerprinting attacks that threaten users' online privacy. In this paper, the authors develop a new video fingerprinting model to explore how well video streaming can be fingerprinted in Tor. They found that their model could distinguish which one of 50 videos a user was hypothetically watching on the Tor network with 85% accuracy, demonstrating that video fingerprinting is a serious threat to the privacy of Tor users.

Read More...

A Cloud-Enabled Communication Strategy for Wildfire Alerts

Vinaithirthan et al. | Jul 19, 2020

A Cloud-Enabled Communication Strategy for Wildfire Alerts

The traditional alert system in California consists of Wireless Emergency Alerts (WEAs), which lack location specificity, and sign-up-based technology which is limited by the number of sign ups. Those who do not have phones or have a silence option on their devices are most at risk from the current alert system. Here the authors developed cloud-enabled crisis connection for disaster alerts (CRISIS-CONNECT) to mitigate problems associated with the current alert system.

Read More...

Trajectories Between Cigarette Smoking and Electronic Nicotine Delivery System Use Among Adults in the U.S.

Primack et al. | Apr 30, 2020

Trajectories Between Cigarette Smoking and Electronic Nicotine Delivery System Use Among Adults in the U.S.

In this study, the authors characterized the trends of cigarette use amongst people who do and don't use electronic nicotine delivery systems (or ENDS). This was done to help determine if the use of ENDS is aiding in helping smokers quit, as the data on this has been controversial. They found that use of ENDS among people either with or without previous cigarette usage were more likely to continue using cigarettes in the future. This is important information contributing to our understanding of ways to effectively (and not effectively) reduce cigarette use.

Read More...

Search Articles

Search articles by title, author name, or tags

Clear all filters

Popular Tags

Browse by school level