skip to main content


Title: Stronger Artificial Muscles, with a Twist
Heat engines have long been used for transportation, but electric motors, which deliver clean mechanical actuation and come in a wide range of sizes, have enabled the spread of automated motion used, for example, in pumps, compressors, fans, and escalators. Nonetheless, natural muscles, their biological counterparts, are far more ubiquitous. Human bodies have more than 600 muscles that drive functions such as heartbeat, facial expressions, and locomotion. There are many opportunities for expanding the use of actuators that mimic muscles by directly using electric, thermal, or chemical energy to generate motion and enable more pervasive automation. In this issue, on pages 150, 155, and 145, Mu et al. (1), Yuan et al. (2), and Kanik et al. (3), respectively, describe new types of fiber-shaped artificial muscles that exploit advantages derived from the mechanics of twisted and coiled geometries.  more » « less
Award ID(s):
1825758
NSF-PAR ID:
10111909
Author(s) / Creator(s):
Date Published:
Journal Name:
Science
Volume:
365
Issue:
6449
ISSN:
0036-8075
Page Range / eLocation ID:
125-126
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Heat engines have long been used for transportation, but electric motors, which deliver clean mechanical actuation and come in a wide range of sizes, have enabled the spread of automated motion used, for example, in pumps, compressors, fans, and escalators. Nonetheless, natural muscles, their biological counterparts, are far more ubiquitous. Human bodies have more than 600 muscles that drive functions such as heartbeat, facial expressions, and locomotion. There are many opportunities for expanding the use of actuators that mimic muscles by directly using electric, thermal, or chemical energy to generate motion and enable more pervasive automation. In this issue, on pages 150, 155, and 145, Mu et al. (1), Yuan et al. (2), and Kanik et al. (3), respectively, describe new types of fiber-shaped artificial muscles that exploit advantages derived from the mechanics of twisted and coiled geometries. 
    more » « less
  2. null (Ed.)
    People come in different shapes and sizes, but most will perform similarly well if asked to complete a task requiring fine manual dexterity – such as holding a pen or picking up a single grape. How can different individuals, with different sized hands and muscles, produce such similar movements? One explanation is that an individual’s brain and nervous system become precisely tuned to mechanics of the body’s muscles and skeleton. An alternative explanation is that brain and nervous system use a more “robust” control policy that can compensate for differences in the body by relying on feedback from the senses to guide the movements. To distinguish between these two explanations, Uyanik et al. turned to weakly electric freshwater fish known as glass knifefish. These fish seek refuge within root systems, reed grass and among other objects in the water. They swim backwards and forwards to stay hidden despite constantly changing currents. Each fish shuttles back and forth by moving a long ribbon-like fin on the underside of its body. Uyanik et al. measured the movements of the ribbon fin under controlled conditions in the laboratory, and then used the data to create computer models of the brain and body of each fish. The models of each fish’s brain and body were quite different. To study how the brain interacts with the body, Uyanik et al. then conducted experiments reminiscent of those described in the story of Frankenstein and transplanted the brain from each computer model into the body of different model fish. These “brain swaps” had almost no effect on the model’s simulated swimming behavior. Instead, these “Frankenfish” used sensory feedback to compensate for any mismatch between their brain and body. This suggests that, for some behaviors, an animal’s brain does not need to be precisely tuned to the specific characteristics of its body. Instead, robust control of movement relies on many seemingly redundant systems that provide sensory feedback. This has implications for the field of robotics. It further suggests that when designing robots, engineers should prioritize enabling the robots to use sensory feedback to cope with unexpected events, a well-known idea in control engineering. 
    more » « less
  3. Mobile devices typically rely on entry-point and other one-time authentication mechanisms such as a password, PIN, fingerprint, iris, or face. But these authentication types are prone to a wide attack vector and worse 1 INTRODUCTION Currently smartphones are predominantly protected a patterned password is prone to smudge attacks, and fingerprint scanning is prone to spoof attacks. Other forms of attacks include video capture and shoulder surfing. Given the increasingly important roles smartphones play in e-commerce and other operations where security is crucial, there lies a strong need of continuous authentication mechanisms to complement and enhance one-time authentication such that even if the authentication at the point of login gets compromised, the device is still unobtrusively protected by additional security measures in a continuous fashion. The research community has investigated several continuous authentication mechanisms based on unique human behavioral traits, including typing, swiping, and gait. To this end, we focus on investigating physiological traits. While interacting with hand-held devices, individuals strive to achieve stability and precision. This is because a certain degree of stability is required in order to manipulate and interact successfully with smartphones, while precision is needed for tasks such as touching or tapping a small target on the touch screen (Sitov´a et al., 2015). As a result, to achieve stability and precision, individuals tend to develop their own postural preferences, such as holding a phone with one or both hands, supporting hands on the sides of upper torso and interacting, keeping the phone on the table and typing with the preferred finger, setting the phone on knees while sitting crosslegged and typing, supporting both elbows on chair handles and typing. On the other hand, physiological traits, such as hand-size, grip strength, muscles, age, 424 Ray, A., Hou, D., Schuckers, S. and Barbir, A. Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects. DOI: 10.5220/0010225804240431 In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), pages 424-431 ISBN: 978-989-758-491-6 Copyrightc 2021 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved still, once compromised, fail to protect the user’s account and data. In contrast, continuous authentication, based on traits of human behavior, can offer additional security measures in the device to authenticate against unauthorized users, even after the entry-point and one-time authentication has been compromised. To this end, we have collected a new data-set of multiple behavioral biometric modalities (49 users) when a user fills out an account recovery form in sitting using an Android app. These include motion events (acceleration and angular velocity), touch and swipe events, keystrokes, and pattern tracing. In this paper, we focus on authentication based on motion events by evaluating a set of score level fusion techniques to authenticate users based on the acceleration and angular velocity data. The best EERs of 2.4% and 6.9% for intra- and inter-session respectively, are achieved by fusing acceleration and angular velocity using Nandakumar et al.’s likelihood ratio (LR) based score fusion. 
    more » « less
  4. null (Ed.)
    Cells often respond to changes in their environment by producing new molecules and building new cell components, such as proteins, which perform most tasks in the cell, or DNA and RNA, which carry genetic information. Complex tissues – such as limbs, which are made up of muscles, tendons, bones and cartilage – are difficult to see through, so studying when and where cells in these tissues produce different types of molecules is challenging. New approaches combining advanced three-dimensional microscopy and fluorescent labelling of molecules could provide a way to study these processes within whole animal tissues. One application for this is studying how salamanders regrow lost limbs. When salamanders such as axolotls regrow a limb, some cells in the limb stump form a group called the blastema. The blastema contains cells that are specialized to different purposes. Each cell in the blastema produces many new proteins as well as new DNA and RNA molecules. Fluorescently labeling particular molecules and taking images of the regenerating limb at different times can help to reveal how these new molecules control and coordinate limb regrowth. Duerr et al. developed a three-dimensional microscopy technique to study the production of new molecules in regenerating axolotl limbs. The method labeled molecules of different types with fluorescent markers. As a result, new proteins, RNA and DNA glowed under different colored lights. Duerr et al. used their method to show that nerve damage, which hinders limb regrowth in salamanders, reduces DNA production in the blastema. There are many possible applications of this microscopy method. Since the technique allows the spatial arrangement of the cells and molecules studied to be preserved, it makes it possible to investigate which molecules each cell is making and how they interact across a tissue. Not only does the technique have the potential to reveal much more about limb regrowth at all stages, but the fluorescent markers used can also be easily adapted to many other applications. 
    more » « less
  5. Abstract

    Axial Seamount is an active submarine volcano located at the intersection of the Cobb hot spot and the Juan de Fuca Ridge (45°57′N, 130°01′W). Bottom pressure recorders captured co‐eruption subsidence of 2.4–3.2 m in 1998, 2011, and 2015, and campaign‐style pressure surveys every 1–2 years have provided a long‐term time series of inter‐eruption re‐inflation. The 2015 eruption occurred shortly after the Ocean Observatories Initiative (OOI) Cabled Array came online providing real‐time seismic and deformation observations for the first time. Nooner and Chadwick (2016,https://doi.org/10.1126/science.aah4666) used the available vertical deformation data to model the 2015 eruption deformation source as a steeply dipping prolate‐spheroid, approximating a high‐melt zone or conduit beneath the eastern caldera wall. More recently, Levy et al. (2018,https://doi.org/10.1130/G39978.1) used OOI seismic data to estimate dip‐slip motion along a pair of outward‐dipping caldera ring faults. This fault motion complicates the deformation field by contributing up to several centimeters of vertical seafloor motion. In this study, fault‐induced surface deformation was calculated from the slip estimates of Levy et al. (2018,https://doi.org/10.1130/G39978.1) then removed from vertical deformation data prior to model inversions. Removing fault motion resulted in an improved model fit with a new best‐fitting deformation source located 2.11 km S64°W of the source of Nooner and Chadwick (2016,https://doi.org/10.1126/science.aah4666) with similar geometry. This result shows that ring fault motion can have a significant impact on surface deformation, and future modeling efforts need to consider the contribution of fault motion when estimating the location and geometry of subsurface magma movement at Axial Seamount.

     
    more » « less