More stories

  • in

    Evidence of power: Phasing quantum annealers into experiments from nonequilibrium physics

    Scientists at Tokyo Institute of Technology (Tokyo Tech) use commercially available quantum annealers, a type of quantum computer, to experimentally probe the validity of an important mechanism from nonequilibrium physics in open quantum systems. The results not only shed light into the extent of applicability of this mechanism and an extension of it, but also showcase how quantum annealers can serve as effective platforms for quantum simulations.
    It is established that matter can transition between different phases when certain parameters, such as temperature, are changed. Although phase transitions are common (like water turning into ice in a freezer), the dynamics that govern these processes are highly complex and constitute a prominent problem in the field of nonequilibrium physics.
    When a system undergoes a phase transition, matter in the new phase has many possible energetically equal “configurations” to adopt. In these cases, different parts of the system adopt different configurations over regions called “domains.” The interfaces between these domains are known as topological defects and reducing the number of these defects formed can be immensely valuable in many applications.
    One common strategy to reduce defects is easing the system through the phase transition slowly. In fact, according to the “Kibble-Zurek” mechanism (KZM), it is predicted that the average number of defects and the driving time of the phase transition follow a universal power law. However, experimentally testing the KZM in a quantum system has remained a coveted goal.
    In a recent study published in Physical Review Research, a team of scientists led by Professor Emeritus Hidetoshi Nishimori from Tokyo Institute of Technology, Japan, probed the validity of the KZM in two commercially available quantum annealers, a type of quantum computer designed for solving complex optimization problems. These devices, known as D-Wave annealers, can recreate controllable quantum systems and control their evolution over time, providing a suitable experimental testbed for the KZM.
    First, the scientists checked whether the “power law” between the average number of defects and the annealing time (driving time of the phase transition) predicted by the KZM held for a quantum magnetic system called the “one-dimensional transverse-field Ising model.” This model represents the orientations (spins) of a long chain of “magnetic dipoles,” where homogenous regions are separated by defects seen as neighboring spins pointing in incorrect directions.
    While the original prediction of the KZM regarding the average number of defects was valid in this system, the scientists took it a step further: although this extension of the KZM was originally intended for a completely “isolated” quantum system unaffected by external parameters, they found good agreement between its predictions and their experimental results even in the D-Wave annealers, which are “open” quantum systems.
    Excited by these results, Prof Nishimori remarks: “Our work provides the first experimental test of universal critical dynamics in a many-body open quantum system. It also constitutes the first test of certain physics beyond the original KZM, providing strong experimental evidence that the generalized theory holds beyond the regime of validity theoretically established.”
    This study showcases the potential of quantum annealers to perform simulations of quantum systems and also helps gain insight on other areas of physics. In this regard, Prof Nishimori states: “Our results leverage quantum annealing devices as platforms to test and explore the frontiers of nonequilibrium physics. We hope our work will motivate further research combining quantum annealing and other universal principles in nonequilibrium physics.” Hopefully, this study will also promote the use of quantum annealers in experimental physics. After all, who doesn’t love finding a new use for a tool?

    Story Source:
    Materials provided by Tokyo Institute of Technology. Note: Content may be edited for style and length. More

  • in

    Detailed picture of US bachelor's programs in computing

    ACM, the Association for Computing Machinery, recently released its eighth annual Study of Non-Doctoral Granting Departments in Computing (NDC study). With the aim of providing a comprehensive look at computing education, the study includes information on enrollments, degree completions, faculty demographics, and faculty salaries. For the first time, this year’s ACM NDC study includes enrollment and degree completion data from the National Student Clearinghouse Research Center (NSC).
    In previous years, ACM directly surveyed Computer Science departments, and would work with a sample of approximately 18,000 students. By accessing the NSC’s data, the ACM NDC study now includes information on approximately 300,000 students across the United States, allowing for a more reliable understanding of the state of enrollment and graduation in Bachelor’s programs. Also for the first time, the ACM NDC study includes data from private, for-profit institutions, which are playing an increasingly important role in computing education.
    “By partnering with the NSC, we now have a much fuller picture of computing enrollment and degree production at the Bachelor’s level,” explained ACM NDC study co-author Stuart Zweben, Professor Emeritus, Ohio State University. “The NSC also gives us more specific data on the gender and ethnicity of students. This is an important tool, as increasing the participation of women and other underrepresented groups has been an important goal for leaders in academia and industry. For example, having a clear picture of the current landscape for underrepresented people is an essential first step toward developing approaches to increase diversity.”
    “The computing community has come to rely on the ACM NDC study to understand trends in undergraduate computing education,” added ACM NDC study co-author Jodi Tims, Professor, Northeastern University. “At the same time, using our previous data collection methods, we were only capturing about 15-20% of institutions offering Bachelor’s degrees in computing. The NSC data gives us a much broader sample, as well as more precise information about enrollment and graduation in specific computing disciplines — such as computer science, information systems, information technology, software engineering, computer engineering and cybersecurity. For example, we’ve seen a noticeable increase in cybersecurity program offerings between the 2017/2018 and 2018/2019 academic years, and we believe this trend will continue next year. Going forward, we also plan to begin collecting information on data science offerings in undergraduate education. Our overall goal will be to maintain the ACM NDC study as the most up-to-date and authoritative resource on this topic.”
    As with previous NDC studies, information on faculty salaries, retention, and demographics was collected by sending surveys to academic departments across the United States. Responses were received from 151 departments. The average number of full-time faculty members at the responding departments was 12.
    Important findings of the ACM NDC study include:
    -Between the 2017/2018 and the 2018/2019 academic years, there was a 4.7% increase in degree production across all computing disciplines. The greatest increases in degree production were in software engineering (9% increase) and computer science (7.5% increase)
    -The representation of women in information systems (24.5% of degree earners in the 2018/2019 academic year) and information technology (21.5% of degree earners in the 2018/2019 academic year) is much higher than in areas such as computer engineering (12.2% of degree earners in the 2018/2019 academic year).
    -Bachelor’s programs, as recorded by the ACM NDC study, had a stronger representation of African American and Hispanic students than PhD programs, as recorded by the Computer Research Association’s (CRA) Taulbee Survey. For example, during the 2018/2019 academic year, the ACM NDC records that 15.6% of enrollees in Bachelor’s programs were African American, whereas the CRA Taulbee survey records that 4.7% of enrollees in PhD programs were African American.
    -In some disciplines of computing, African Americans and Hispanics are actually over-represented, based on their percentage of the US population.
    -Based on aggregate salary data from 89 non-doctoral-granting computer science departments (including public and private institutions), the average median salary for a full professor was $109,424.
    – Of 40 non-doctoral granting departments reporting over 56 faculty departures, only 10.7% of faculty departed for non-academic positions. Most departed due to retirement (46.4%) or other academic positions (26.9%).

    In addition to Stuart Zweben, and Jodi Tims, the ACM NDC study was co-authored by Yan Timanovsky, Association for Computing Machinery. By employing the NSC data in future ACM NDC studies, the co-authors are confident that an even fuller picture will emerge regarding student retention with respect to computing disciplines, gender and ethnicity. More

  • in

    Experiments reveal why human-like robots elicit uncanny feelings

    Androids, or robots with humanlike features, are often more appealing to people than those that resemble machines — but only up to a certain point. Many people experience an uneasy feeling in response to robots that are nearly lifelike, and yet somehow not quite “right.” The feeling of affinity can plunge into one of repulsion as a robot’s human likeness increases, a zone known as “the uncanny valley.”
    The journal Perception published new insights into the cognitive mechanisms underlying this phenomenon made by psychologists at Emory University.
    Since the uncanny valley was first described, a common hypothesis developed to explain it. Known as the mind-perception theory, it proposes that when people see a robot with human-like features, they automatically add a mind to it. A growing sense that a machine appears to have a mind leads to the creepy feeling, according to this theory.
    “We found that the opposite is true,” says Wang Shensheng, first author of the new study, who did the work as a graduate student at Emory and recently received his PhD in psychology. “It’s not the first step of attributing a mind to an android but the next step of ‘dehumanizing’ it by subtracting the idea of it having a mind that leads to the uncanny valley. Instead of just a one-shot process, it’s a dynamic one.”
    The findings have implications for both the design of robots and for understanding how we perceive one another as humans.
    “Robots are increasingly entering the social domain for everything from education to healthcare,” Wang says. “How we perceive them and relate to them is important both from the standpoint of engineers and psychologists.”
    “At the core of this research is the question of what we perceive when we look at a face,” adds Philippe Rochat, Emory professor of psychology and senior author of the study. “It’s probably one of the most important questions in psychology. The ability to perceive the minds of others is the foundation of human relationships. ”

    advertisement

    The research may help in unraveling the mechanisms involved in mind-blindness — the inability to distinguish between humans and machines — such as in cases of extreme autism or some psychotic disorders, Rochat says.
    Co-authors of the study include Yuk Fai Cheong and Daniel Dilks, both associate professors of psychology at Emory.
    Anthropomorphizing, or projecting human qualities onto objects, is common. “We often see faces in a cloud for instance,” Wang says. “We also sometimes anthropomorphize machines that we’re trying to understand, like our cars or a computer.”
    Naming one’s car or imagining that a cloud is an animated being, however, is not normally associated with an uncanny feeling, Wang notes. That led him to hypothesize that something other than just anthropomorphizing may occur when viewing an android.
    To tease apart the potential roles of mind-perception and dehumanization in the uncanny valley phenomenon the researchers conducted experiments focused on the temporal dynamics of the process. Participants were shown three types of images — human faces, mechanical-looking robot faces and android faces that closely resembled humans — and asked to rate each for perceived animacy or “aliveness.” The exposure times of the images were systematically manipulated, within milliseconds, as the participants rated their animacy.
    The results showed that perceived animacy decreased significantly as a function of exposure time for android faces but not for mechanical-looking robot or human faces. And in android faces, the perceived animacy drops at between 100 and 500 milliseconds of viewing time. That timing is consistent with previous research showing that people begin to distinguish between human and artificial faces around 400 milliseconds after stimulus onset.
    A second set of experiments manipulated both the exposure time and the amount of detail in the images, ranging from a minimal sketch of the features to a fully blurred image. The results showed that removing details from the images of the android faces decreased the perceived animacy along with the perceived uncanniness.
    “The whole process is complicated but it happens within the blink of an eye,” Wang says. “Our results suggest that at first sight we anthropomorphize an android, but within milliseconds we detect deviations and dehumanize it. And that drop in perceived animacy likely contributes to the uncanny feeling.”

    Story Source:
    Materials provided by Emory Health Sciences. Original written by Carol Clark. Note: Content may be edited for style and length. More

  • in

    How do people prefer coronavirus contact tracing to be carried out?

    People prefer coronavirus contact tracing to be carried out by a combination of apps and humans, a new study shows.
    The research shows people are more concerned about who runs the process than the risks of others having unauthorised access to their private information, or their data being stolen.
    Most people who took part in the research were in favour of the NHS processing personal data rather than the Government or even a decentralised system that stores only minimal personal data.
    A total of 41 per cent of those questioned wanted a mixture of an app and human contact during the tracing process, compared to 22 per cent who wanted it purely to be run via contact with another person and 37 per cent who wanted the process to only be digital.
    The research was conducted by Laszlo Horvath, Susan Banducci and Oliver James from the University of Exeter during May and is published in the Journal of Experimental Political Science.
    They ran an experiment on 1,504 people who were given information about two apps though a series of five pairings, with their properties relating to privacy and data security displayed randomly, and asked which they would prefer to use. In a second study, the academics also surveyed 809 people about their preferences for how apps should be run and designed.
    The decentralised system of contact tracing, currently trialled in the UK, was chosen by participants with a 50 per cent probability, meaning this particular design didn’t influence people’s choice. However the probability of people choosing the app designed to work as part of a NHS-led centralised system was 57 per cent, meaning it was more popular, while 43 per cent of apps chosen were described as having data which would be stored on servers belonging to the UK government, making them less popular.
    A randomly selected group of people were also informed about the risk of data breach issues, but this didn’t have an impact on people’s preferences.
    Dr Horvath said: “We had thought people would prefer apps which were less intrusive and protected their privacy, for example not needing as much information about their location, but this wasn’t the case. Our research shows people are supportive of taking part in the contact tracing process if needed. They are less concerned about the possibility of data breach problems than who their app is run by, and privacy didn’t affect their preferences when they had a choice of apps.”
    Professor Banducci said: “Our research shows people are supportive of the NHS storing and using their personal information. Faith and trust in the NHS is high at the moment so it may motivate people to take part in the process if the Government involves the health service in its development and deployment. Trust in the provider of contact tracing will be crucial if it is to be used successfully to reduce the spread of infection.”
    Professor James said: “People who took part in this research preferred a balanced — human plus digital — approach to contract tracing. Privacy concerns were not as influential as we expected. Trust in the provider of the app is currently more important, something for the Government to remember as work on the UK’s contact tracing system continues.”

    Story Source:
    Materials provided by University of Exeter. Note: Content may be edited for style and length. More

  • in

    Study confirms widespread literacy in biblical-period kingdom of Judah

    Researchers at Tel Aviv University (TAU) have analyzed 18 ancient texts dating back to around 600 BCE from the Tel Arad military post using state-of-the-art image processing, machine learning technologies, and the expertise of a senior handwriting examiner. They have concluded that the texts were written by no fewer than 12 authors, suggesting that many of the inhabitants of the kingdom of Judah during that period were able to read and write, with literacy not reserved as an exclusive domain in the hands of a few royal scribes.
    The special interdisciplinary study was conducted by TAU’s Dr. Arie Shaus, Ms. Shira Faigenbaum-Golovin, and Dr. Barak Sober of the Department of Applied Mathematics; Prof. Eli Piasetzky of the Raymond and Beverly Sackler School of Physics and Astronomy; and Prof. Israel Finkelstein of the Jacob M. Alkow Department of Archeology and Ancient Near Eastern Civilizations. The forensic handwriting specialist, Ms. Yana Gerber, is a senior expert who served for 27 years in the Questioned Documents Laboratory of the Israel Police Division of Identification and Forensic Science and its International Crime Investigations Unit.
    The results were published in PLOS ONE on September 9, 2020.
    “There is a lively debate among experts as to whether the books of Deuteronomy, Joshua, Judges, Samuel, and Kings were compiled in the last days of the kingdom of Judah or after the destruction of the First Temple by the Babylonians,” Dr. Shaus explains. “One way to try to get to the bottom of this question is to ask when there was the potential for the writing of such complex historical works.
    “For the period following the destruction of the First Temple in 586 BC, there is very scant archaeological evidence of Hebrew writing in Jerusalem and its surroundings, but an abundance of written documents has been found for the period preceding the destruction of the Temple. But who wrote these documents? Was this a society with widespread literacy, or was there just a handful of literate people?”
    To answer this question, the researchers examined the ostraca (fragments of pottery vessels containing ink inscriptions) writings discovered at the Tel Arad site in the 1960s. Tel Arad was a small military post on the southern border of the kingdom of Judah; its built-up area was about 20,000 square feet and it housed between 20 and 30 soldiers.

    advertisement

    “We examined the question of literacy empirically, from different directions of image processing and machine learning,” says Ms. Faigenbaum-Golovin. “Among other things, these areas help us today with the identification, recognition, and analysis of handwriting, signatures, and so on. The big challenge was to adapt modern technologies to 2,600-year-old ostraca. With a lot of effort, we were able to produce two algorithms that could compare letters and answer the question of whether two given ostraca were written by two different people.”
    In 2016, the researchers theorized that 18 of the Tel Arad inscriptions were written by at least four different authors. Combined with additional textual evidence, the researchers concluded that there were in fact at least six different writers. The study aroused great interest around the world.
    The TAU researchers then decided to compare the algorithmic methods, which have since been refined, to the forensic approach. To this end, Ms. Gerber joined the team. After an in-depth examination of the ancient inscriptions, she found that the 18 texts were written by at least 12 distinct writers with varying degrees of certainty. She examined the original Tel Arad ostraca at the Israel Museum, the Eretz Israel Museum, the Sonia and Marco Nedler Institute of Archaeology of Tel Aviv University, and the Israel Antiquities Authority’s warehouses at Beit Shemesh.
    Ms. Gerber explained:
    “This study was very exciting, perhaps the most exciting in my professional career. These are ancient Hebrew inscriptions written in ink on shards of pottery, utilizing an alphabet that was previously unfamiliar to me. I studied the characteristics of the writing in order to analyze and compare the inscriptions, while benefiting from the skills and knowledge I acquired during my bachelor’s degree studies in classical archaeology and ancient Greek at Tel Aviv University. I delved into the microscopic details of these inscriptions written by people from the First Temple period, from routine issues such as orders concerning the movement of soldiers and the supply of wine, oil, and flour, through correspondence with neighboring fortresses, to orders that reached the Tel Arad fortress from the high ranks of the Judahite military system. I had the feeling that time had stood still and there was no gap of 2,600 years between the writers of the ostraca and ourselves.

    advertisement

    “Handwriting is made up of unconscious habit patterns. The handwriting identification is based on the principle that these writing patterns are unique to each person and no two people write exactly alike. It is also assumed that repetitions of the same text or characters by the same writer are not exactly identical and one can define a range of natural handwriting variations specific to each one. Thus, forensic handwriting analysis aims at tracking features corresponding to specific individuals, and concluding whether a single or rather different authors wrote the given documents.
    “The examination process is divided into three steps: analysis, comparison, and evaluation. The analysis includes a detailed examination of every single inscription, according to various features, such as the spacing between letters, their proportions, slant, etc. The comparison is based upon the aforementioned features across various handwritings. In addition, consistent patterns,such the same combinations of letters, words, and punctuation, are identified. Finally, an evaluation of identicalness or distinctiveness of the writers is made. It should be noted that, according to an Israel Supreme Court ruling, a person can be convicted of a crime based on the opinion of a forensic handwriting expert.”
    Dr. Shaus further elaborated:
    “We were in for a big surprise: Yana identified more authors than our algorithms did. It must be understood that our current algorithms are of a “cautious” nature — they know how to identify cases in which the texts were written by people with significantly different writing; in other cases they refrain from definite conclusions. In contrast, an expert in handwriting analysis knows not only how to spot the differences between writers more accurately, but in some cases may also arrive at the conclusion that several texts were actually written by a single person. Naturally, in terms of consequences, it is very interesting to see who the authors are. Thanks to the findings, we were able to construct an entire flowchart of the correspondence concerning the military fortress — who wrote to whom and regarding what matter. This reflects the chain of command within the Judahite army.
    “For example, in the area of Arad, close to the border between the kingdoms of Judah and Edom, there was a military force whose soldiers are referred to as “Kittiyim” in the inscriptions, most likely Greek mercenaries. Someone, probably their Judahite commander or liaison officer, requested provisions for the Kittiyim unit. He writes to the quartermaster of the fortress in Arad “give the Kittiyim flour, bread, wine” and so on. Now, thanks to the identification of the handwriting, we can say with high probability that there was not only one Judahite commander writing, but at least four different commanders. It is conceivable that each time another officer was sent to join the patrol, they took turns.”
    According to the researchers, the findings shed new light on Judahite society on the eve of the destruction of the First Temple — and on the setting of the compilation of biblical texts. Dr. Sober explains:
    “It should be remembered that this was a small outpost, one of a series of outposts on the southern border of the kingdom of Judah. Since we found at least 12 different authors out of 18 texts in total, we can conclude that there was a high level of literacy throughout the entire kingdom. The commanding ranks and liaison officers at the outpost, and even the quartermaster Eliashib and his deputy, Nahum, were literate. Someone had to teach them how to read and write, so we must assume the existence of an appropriate educational system in Judah at the end of the First Temple period. This, of course, does not mean that there was almost universal literacy as there is today, but it seems that significant portions of the residents of the kingdom of Judah were literate. This is important to the discussion on the composition of biblical texts. If there were only two or three people in the whole kingdom who could read and write, then it is unlikely that complex texts would have been composed.”
    Prof. Finkelstein concludes:
    “Whoever wrote the biblical works did not do so for us, so that we could read them after 2,600 years. They did so in order to promote the ideological messages of the time. There are different opinions regarding the date of the composition of biblical texts. Some scholars suggest that many of the historical texts in the Bible, from Joshua to II Kings, were written at the end of the 7th century BC, very close to the period of the Arad ostraca. It is important to ask who these texts were written for. According to one view, there were events in which the few people who could read and write stood before the illiterate public and read texts out to them. A high literacy rate in Judah puts things into a different light.
    “Until now, the discussion of literacy in the kingdom of Judah has been based on circular arguments, on what is written within the Bible itself, for example on scribes in the kingdom. We have shifted the discussion to an empirical perspective. If in a remote place like Tel Arad there was, over a short period of time, a minimum of 12 authors of 18 inscriptions, out of the population of Judah which is estimated to have been no more than 120,000 people, it means that literacy was not the exclusive domain of a handful of royal scribes in Jerusalem. The quartermaster from the Tel Arad outpost also had the ability to read and appreciate them.” More

  • in

    Superconductors are super resilient to magnetic fields

    A researcher at the University of Tsukuba has offered a new explanation for how superconductors exposed to a magnetic field can recover — without loss of energy — to their previous state after the field is removed. This work may lead to a new theory of superconductivity and a more eco-friendly electrical distribution system.
    Superconductors are a class of materials with the amazing property of being able to conduct electricity with zero resistance. In fact, an electrical current can circle around a loop of superconducting wire indefinitely. The catch is that these materials must be kept very cold, and even so, a strong magnetic field can cause a superconductor to revert back to normal.
    It was once assumed that the superconducting-to-normal transition caused by a magnetic field could not be reversed easily, since the energy would be dissipated by the usual process of Joule heating. This mechanism, by which the resistance in normal wires converts electrical energy into heat, is what allows us to use an electric stovetop or space heater.
    “Joule heating is usually considered negatively, because it wastes energy and can even cause overloaded wires to melt,” explains Professor Hiroyasu Koizumi of the Division of Quantum Condensed Matter Physics, the Center for Computational Sciences at the University of Tsukuba. “However, it has been known for a long time from experiments that, if you remove the magnetic field, a current-carrying superconductor can, in fact, be returned to its previous state without loss of energy,”
    Now, Professor Koizumi has proposed a new explanation for this phenomenon. In the superconducting state, elections pair up and move in sync, but the true cause of this synchronized motion is the presence of so-called “Berry connection,” characterized by the topological quantum number. It is an integer and if it is nonzero, current flows. Thus, this supercurrent can be switched off abruptly by changing this number to zero without Joule heating.
    The founder of modern electromagnetic theory, James Clerk Maxwell, once postulated a similar molecular vortex model that imagined space being filled with the rotation of currents in tiny circles. Since everything was spinning the same way, it reminded Maxwell of “idle wheels,” which were gears used in machines for this purpose.
    “The surprising thing is that a model from the early days of electromagnetism, like Maxwell’s idle wheels, can help us resolve questions arising today,” Professor Koizumi says. “This research may help lead to a future in which energy can be delivered from power plants to homes with perfect efficiency.”

    Story Source:
    Materials provided by University of Tsukuba. Note: Content may be edited for style and length. More

  • in

    Positive results for ReWalk ReStore exosuit in stroke rehabilitation

    A team of U.S. researchers published the results of a multi-center, single-arm trial of the ReWalk ReStore™ for gait training in individuals undergoing post-stroke rehabilitation. They found the device safe and reliable during treadmill and overground walking under the supervision of physical therapists. The article, “The ReWalk ReStore soft robotic exosuit: a multisite clinical trial of the safety, reliability, and feasibility of exosuit-augmented post-stroke gait rehabilitation,” was published open access in the Journal of NeuroEngineering and Rehabilitation on June 18, 2020.
    The authors are the principal investigators of each of the five testing sites: Louis N. Awad, PT, DPT, PhD, of Spaulding Rehabilitation Hospital, Boston, MA, Alberto Esquenazi, MD, of MossRehab Stroke and Neurological Disease Center, Elkins Park, PA, Gerard E. Francisco, MD, of TIRR Memorial Hermann, Houston, TX, Karen J, Nolan, PhD, of Kessler Foundation, West Orange, NJ, and lead investigator Arun Jayaramam, PT, PhD, of the Shirley Ryan AbilityLab, Chicago, IL.
    The ReStore™ exosuit (ReWalk Robotics, Ltd) is the first soft robotic exosuit cleared by the FDA for use in stroke survivors with mobility deficits. The device is indicated for individuals with hemiplegia undergoing stroke rehabilitation under the care of licensed physical therapists. Hemiplegia causes weakness of the ankle, limiting the ability to clear the ground during stepping and hindering forward movement. This leads to compensatory walking patterns that increase effort and decrease stability.
    ReStore is designed to augment ankle plantarflexion and dorsiflexion, allowing a more normal gait pattern. Motors mounted on a waist belt transmit power through cables to attachment points on an insole and the patient’s calf. Sensors clipped to the patient’s shoes transmit data to a handheld smartphone controller used by a trained therapist to adjust levels of assistance and monitor and record key metrics of gait training.
    The trial enrolled 44 participants with post stroke hemiparesis who were able to walk unassisted for 5 feet. The protocol consisted of 5 days of 20-minute sessions of treadmill and overground training under the supervision of licensed physical therapists. To assess the therapeutic potential for ReStore in rehabilitation, the researchers also explored the effects of the device on maximum walking speed, measuring participants’ walking speed in and out of the device using the 10-m walk test, before and after the five training visits. For safety purposes, some participants were allowed to use an AFO or cane during walking sessions.
    The trial determined the safety, reliability, and feasibility of the device in this stroke population. “We found that the ReStore provided targeted assistance for plantarflexion and dorsiflexion of the paretic ankle, improving the gait pattern,” explained Dr. Nolan, senior research scientist in the Center for Mobility and Rehabilitation Engineering Research at Kessler Foundation. “This is an important first step toward expanding options for rehabilitative care for the millions of individuals with mobility impairments caused by ischemic and hemorrhagic stroke.”
    The trial’s exploratory data indicated positive effects of the training on the walking speed of participants during exosuit-assisted walking and unassisted walking (walking without the device). More than one third of participants achieved a significant increase in unassisted walking speed, indicating that further research is warranted.
    Dr. Nolan emphasized that the trial was not designed to measure the device’s efficacy: “Controlled trials are needed to determine the efficacy of ReStore for improving mobility outcomes of stroke rehabilitation.”

    Story Source:
    Materials provided by Kessler Foundation. Note: Content may be edited for style and length. More

  • in

    Vibration device makes homes 'smart' by tracking appliances

    To boost efficiency in typical households — where people forget to take wet clothes out of washing machines, retrieve hot food from microwaves and turn off dripping faucets — Cornell University researchers have developed a single device that can track 17 types of appliances using vibrations.
    The device, called VibroSense, uses lasers to capture subtle vibrations in walls, ceilings and floors, as well as a deep learning network that models the vibrometer’s data to create different signatures for each appliance — bringing researchers closer to a more efficient and integrated smart home.
    “Recognizing home activities can help computers better understand human behaviors and needs, with the hope of developing a better human-machine interface,” said Cheng Zhang, assistant professor of information science and senior author of “VibroSense: Recognizing Home Activities by Deep Learning Subtle Vibrations on an Interior Surface of a House from a Single Point Using Laser Doppler Vibrometry.” The paper was published in Proceedings of the Association for Computing Machinery on Interactive, Mobile, Wearable and Ubiquitous Technologies and will be presented at the ACM International Joint Conference on Pervasive and Ubiquitous Computing, which will be held virtually Sept. 12-17.
    “In order to have a smart home at this point, you’d need each device to be smart, which is not realistic; or you’d need to install separate sensors on each device or in each area,” said Zhang, who directs Cornell’s SciFi Lab. “Our system is the first that can monitor devices across different floors, in different rooms, using one single device.”
    In order to detect usage across an entire house, the researchers’ task was twofold: detect tiny vibrations using a laser Doppler vibrometer; and differentiate similar vibrations created by multiple devices by identifying the paths traveled by the vibrations from room to room.
    The deep learning network was trained to distinguish different activities, partly by learning path signatures — the distinctive path vibrations followed through the house — as well as their distinct noises.
    The device showed nearly 96% accuracy in identifying 17 different activities across five houses — including dripping faucets, an exhaust fan, an electric kettle, a refrigerator and a range hood — in five houses over two days, according to the paper. VibroSense could also distinguish five different stages of appliance usage with an average accuracy more than 97%.
    In single-story houses, the laser was pointed at an interior wall at the center of the home. It was pointed at the ceiling in two-story homes.
    The device is primarily useful in single-family houses, Zhang said, because in buildings it could pick up activities in neighboring apartments, presenting a potential privacy risk.
    “It would definitely require collaboration between researches, industry practitioners and government to make sure this was used for the right purposes,” Zhang said.
    Among other uses, the system could help homes monitor energy usage and potentially help reduce consumption.
    “Since our system can detect both the occurrence of an indoor event, as well as the time of an event, it could be used to estimate electricity and water-usage rates, and provide energy-saving advice for homeowners,” Zhang said. “It could also prevent water and electrical waste, as well as electrical failures such as short circuits in home appliances.”

    Story Source:
    Materials provided by Cornell University. Original written by Melanie Lefkowitz. Note: Content may be edited for style and length. More