45 resultados para Linux security module
Resumo:
This article presents the legislative and judicial practice relating to the "autonomous implementation" of EU law in Switzerland. Given that "euro-compatibility" is the central consideration behind this legislative policy, one would expect Swiss authorities to have devised legislative and hermeneutical techniques guaranteeing high fidelity to EU "mother law". That is not the case, however, and as this article shows much is lost in the translation from EU to Swiss Law
Resumo:
The arbuscular mycorrhizal symbiosis is formed between arbuscular mycorrhizal fungi (AMF) and plant roots. The fungi provide the plant with inorganic phosphate (P). The symbiosis can result in increased plant growth. Although most global food crops naturally form this symbiosis, very few studies have shown that their practical application can lead to large-scale increases in food production. Application of AMF to crops in the tropics is potentially effective for improving yields. However, a main problem of using AMF on a large-scale is producing cheap inoculum in a clean sterile carrier and sufficiently concentrated to cheaply transport. Recently, mass-produced in vitro inoculum of the model mycorrhizal fungus Rhizophagus irregularis became available, potentially making its use viable in tropical agriculture. One of the most globally important food plants in the tropics is cassava. We evaluated the effect of in vitro mass-produced R. irregularis inoculum on the yield of cassava crops at two locations in Colombia. A significant effect of R. irregularis inoculation on yield occurred at both sites. At one site, yield increases were observed irrespective of P fertilization. At the other site, inoculation with AMF and 50% of the normally applied P gave the highest yield. Despite that AMF inoculation resulted in greater food production, economic analyses revealed that AMF inoculation did not give greater return on investment than with conventional cultivation. However, the amount of AMF inoculum used was double the recommended dose and was calculated with European, not Colombian, inoculum prices. R. irregularis can also be manipulated genetically in vitro, leading to improved plant growth. We conclude that application of in vitro R. irregularis is currently a way of increasing cassava yields, that there is a strong potential for it to be economically profitable and that there is enormous potential to improve this efficiency further in the future.
Resumo:
Cette thèse présente un travail audiovisuel « L'examen clinique du sein ». Avec l'unité « L'examen génital » elle forme le module « Gynécologie » du projet Virtual Skills Lab (VSL). Le but du projet VSL est d'établir un portail d'enseignement en ligne pour l'enseignement des compétences cliniques (ce terme étant utilisé ici comme équivalent de l'anglais « clinical skills »). Les compétences traitées sont celles exigées par le Catalogue suisse des objectifs d'apprentissage. L'unité « L'examen clinique du sein » est constituée d'une multitude de courtes séquences vidéo qui peuvent être regardées à la suite ou de manière individuelle. Elle est divisée en étapes logiques telles que l'inspection ou la palpation. Chacune de ces étapes appelées « skill » est présentée de deux façons : comme vue d'ensemble et par une approche pas à pas. La séquence « vue d'ensemble » présente le skill en temps réel et représente donc une visualisation du but à atteindre par l'apprenant. Le skill est décomposé en petites étapes (step), les procédures sont montrées au ralenti, munies d'une explication par une voix off. Le format de ces séquences est présenté en double largeur, la partie de gauche montre l'action, la partie de droite est utilisée pour des tableaux ou des graphiques explicatifs. Les différents gestes des compétences cliniques sont rarement standardisés. Pour VSL, un processus de validation sur la base d'un consensus suisse a été mis en place. Ceci ne veut néanmoins pas dire que les modules VSL validés ont été intégrés dans le curriculum de toutes les universités suisses. Vu la complexité des curriculums et la multitude de facteurs entrant enjeu, notamment sur l'intégration des moyens d'enseignement audiovisuels, leur implémentation est une phase critique de tout projet de ce genre. En Suisse, le multilinguisme y ajoute un degré de complexité. A Lausanne, « L'examen clinique du sein » a été introduit aussi bien dans la formation pré- que postgraduée.
Resumo:
Le but de cette étude est d'explorer et de définir, par une analyse des besoins, si l'offre actuelle en services dans le domaine des addictions est encore adaptée à la situation épidémiologique actuelle des addictions, à l'évolution des types de comportements liés à la dépendance et aux besoins des clients. Il s'agit en particulier de répondre aux questions suivantes: Existe-t-il actuellement des besoins en traitement pour lesquels il n'existe aucune offre appropriée ? Quels groupes ne sont pas ou sont insuffisamment atteints par l'offre existante? A quels genres de problèmes liés à la dépendance et à quels nouveaux besoins des clients les structures oeuvrant dans le domaine de la dépendance sont-elles confrontées? Quels sont les besoins d'adaptation du système de prise en charge nécessaires concernant soit les groupes-cibles de services, soit les types d'offres - en particulier le besoin en nouveaux concepts/modèles de prise en charge pour répondre à l'évolution des besoins? Comment ces structures font-elles face à l'accroissement de l'usage de multiples substances (multi-consommation)?
Resumo:
Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff.
Resumo:
There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.
Resumo:
This study investigated the effectiveness of modules involving standardized patients and role-plays on training communication skills. The first module involved standardized patients and an Objective Structured Clinical Examination (OSCE); the second module consisted of peer role-plays and a written examination. A randomized posttest-only control group design with first-year nursing students was used. The intervention group received one-to-one communication training with direct oral feedback from the standardized patient. The control group had training with peer role-playing and mutual feedback. The posttest involved students' rating their self-efficacy, and real patients and clinical supervisors evaluated their communication skills. No significant differences were found between self-efficacy and patient ratings. However, the clinical supervisors rated the intervention group's communication skills to be significantly (p < 0.0001) superior. Assessments by clinical supervisors indicate that communication training modules including standardized patients and an OSCE are superior to communication training modules with peer role-playing.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
This study aimed to assess the psychometric robustness of the French version of the Supportive Care Needs Survey and breast cancer (BC) module (SCNS-SF34-Fr and SCNS-BR8-Fr). Breast cancer patients were recruited in two hospitals (in Paris, France and Lausanne, Switzerland) either in ambulatory chemotherapy or radiotherapy, or surgery services. They were invited to complete the SCNS-SF34-Fr and SCNS-BR8-Fr as well as quality of life and patient satisfaction questionnaires. Three hundred and eighty-four (73% response rate) BC patients returned completed questionnaires. A five-factor model was confirmed for the SCNS-SF34-Fr with adequate goodness-of-fit indexes, although some items evidenced content redundancy, and a one-factor was identified for the SCNS-BR8-Fr. Internal consistency and test-retest estimates were satisfactory for most scales. The SCNS-SF34-Fr and SCNS-BR8-Fr scales demonstrated conceptual differences with the quality of life and satisfaction with care scales, highlighting the specific relevance of this assessment. Different levels of needs could be differentiated between groups of BC patients in terms of age and level of education (P < 0.001). The SCNS-SF34-Fr and SCNS-BR8-Fr present adequate psychometric properties despite some redundant items. These questionnaires allow for the crucial endeavour to design appropriate care services according to BC patients' characteristics.
Resumo:
The caspase-3/p120 RasGAP module acts as a stress sensor that promotes pro-survival or pro-death signaling depending on the intensity and the duration of the stressful stimuli. Partial cleavage of p120 RasGAP generates a fragment, called fragment N, which protects stressed cells by activating Akt signaling. Akt family members regulate many cellular processes including proliferation, inhibition of apoptosis and metabolism. These cellular processes are regulated by three distinct Akt isoforms: Akt1, Akt2 and Akt3. However, which of these isoforms are required for fragment N mediated protection have not been defined. In this study, we investigated the individual contribution of each isoform in fragment N-mediated cell protection against Fas ligand induced cell death. To this end, DLD1 and HCT116 isogenic cell lines lacking specific Akt isoforms were used. It was found that fragment N could activate Akt1 and Akt2 but that only the former could mediate the protective activity of the RasGAP-derived fragment. Even overexpression of Akt2 or Akt3 could not rescue the inability of fragment N to protect cells lacking Akt1. These results demonstrate a strict Akt isoform requirement for the anti-apoptotic activity of fragment N.
Resumo:
MHC class II (MHCII) genes are transactivated by the NOD-like receptor (NLR) family member CIITA, which is recruited to SXY enhancers of MHCII promoters via a DNA-binding "enhanceosome" complex. NLRC5, another NLR protein, was recently found to control transcription of MHC class I (MHCI) genes. However, detailed understanding of NLRC5's target gene specificity and mechanism of action remained lacking. We performed ChIP-sequencing experiments to gain comprehensive information on NLRC5-regulated genes. In addition to classical MHCI genes, we exclusively identified novel targets encoding non-classical MHCI molecules having important functions in immunity and tolerance. ChIP-sequencing performed with Rfx5(-/-) cells, which lack the pivotal enhanceosome factor RFX5, demonstrated its strict requirement for NLRC5 recruitment. Accordingly, Rfx5-knockout mice phenocopy Nlrc5 deficiency with respect to defective MHCI expression. Analysis of B cell lines lacking RFX5, RFXAP, or RFXANK further corroborated the importance of the enhanceosome for MHCI expression. Although recruited by common DNA-binding factors, CIITA and NLRC5 exhibit non-redundant functions, shown here using double-deficient Nlrc5(-/-)CIIta(-/-) mice. These paradoxical findings were resolved by using a "de novo" motif-discovery approach showing that the SXY consensus sequence occupied by NLRC5 in vivo diverges significantly from that occupied by CIITA. These sequence differences were sufficient to determine preferential occupation and transactivation by NLRC5 or CIITA, respectively, and the S box was found to be the essential feature conferring NLRC5 specificity. These results broaden our knowledge on the transcriptional activities of NLRC5 and CIITA, revealing their dependence on shared enhanceosome factors but their recruitment to distinct enhancer motifs in vivo. Furthermore, we demonstrated selectivity of NLRC5 for genes encoding MHCI or related proteins, rendering it an attractive target for therapeutic intervention. NLRC5 and CIITA thus emerge as paradigms for a novel class of transcriptional regulators dedicated for transactivating extremely few, phylogenetically related genes.