55 resultados para fault-tolerant quantum computation
Resumo:
Le répertoire cellulaire Τ a pour but d'être tolérant aux antigènes du soi afin d'éviter l'induction de maladies autoimmunes. C'est pourquoi les lymphocytes Τ autoréactifs sont éliminés dans le thymus lors de leur développement par le processus de sélection négative. La plupart des recherches étudient les lymphocytes Τ de haute avidité. Ces lymphocytes Τ de haute avidité sont très sensibles et réagissent fortement à un antigène du soi. En conséquence, ces cellules induisent le développement de maladies autoimmunes lorsqu'elles ciblent des organes exprimant l'antigène du soi. Plusieurs études ont montré que les lymphocytes Τ qui réagissent faiblement aux antigènes spécifiques à un tissu, nommé lymphocytes Τ de faible avidité, peuvent contourner les mécanismes de tolérance centrale et périphérique. J'ai utilisé des souris Rip-mOva qui expriment l'Ovalbumine comme antigène du soi spécifique à un tissu. Dans ces souris transgéniques Rip-mOva, les lymphocytes Τ de faible avidité survivent à la sélection négative. Une fois stimulés à la périphérie, ces lymphocytes Τ CD8+ de faible avidité ont la capacité d'infiltrer les organes qui expriment l'antigène du soi chez les souris Rip-mOva et peuvent induire une destruction tissulaire. L'objectif principal de mon projet de thèse était de comprendre les caractéristiques phénotypiques et fonctionnelles de ces lymphocytes Τ dans un état d'équilibre et dans un contexte infectieux. Pour étudier ces cellules dans un modèle murin bien défini, nous avons généré des souris exprimant un récepteur de cellule Τ transgénique appelé OT-3. Ces souris transgéniques OT-3 ont des lymphocytes Τ CD8+ de faible avidité spécifiques à l'épitope SIINFEKL de l'antigène Ovalbumine. Nous avons démontré qu'un grand nombre de lymphocytes Τ CD8+ OT-3 ne sont pas éliminés lors de la sélection négative dans le thymus après avoir rencontré l'antigène du soi. Par conséquent, les lymphocytes Τ OT-3 de faible avidité sont présents dans une fenêtre de sélection comprise entre la sélection positive et négative. Cette limite se définie comme le seuil d'affinité et est impliquée dans l'échappement de certains lymphocytes Τ OT- 3 autoréactifs. A la périphérie, ces cellules sont capables d'induire une autoimmunité après stimulation au cours d'une infection, ce qui nous permet de les définir comme étant non tolérante et non dans un état anergique à la périphérie. Nous avons également étudié le seuil d'activation des lymphocytes Τ OT-3 à faible avidité à la périphérie et avons constaté que des ligands peptidiques plus faibles que l'épitope natif SIINFEKL sont capables de les activer au cours d'une infection ainsi que de les différencier en lymphocytes Τ effecteurs et mémoires. Les données illustrent une déficience lors de la sélection négative dans le thymus de lymphocytes Τ CD8+ autoréactifs de faible avidité contre un antigène du soi spécifique à tissu et montrent que ces cellules sont entièrement compétentes lors d'une infection. - The diverse Τ cell repertoire needs to be tolerant to self-antigen to avoid the induction of autoimmunity. This is why autoreactive developing Τ cells are deleted in the thymus. The deletion of self-reactive Τ cells occurs through the process of negative selection. Most studies investigated high avidity Τ cells. These high avidity Τ cells are very sensitive and strongly react to a self-antigen. As a consequence, these cells induce the development of autoimmunity when they target organs which express the self-antigen. High avidity autoreactive CD8+ Τ cells are deleted in the thymus. However, several studies have shown Τ cells that weakly respond to tissue-restricted antigen, referred to as low avidity Τ cells, can bypass central and peripheral tolerance mechanisms. I used Rip-mOva mice that expressed Ovalbumin as a neo self-antigen in a tissue-restricted fashion. In these transgenic Rip-mOva mice low avidity CD8+ Τ cells survive negative selection. Upon stimulation in the periphery, these low avidity CD8+ Τ cells have the ability to infiltrate organs that express the self-antigen in the Rip-mOva mice and can also induce the destruction of the tissue. The major aim of my PhD project was to understand the phenotypic and functionality characteristics of these Τ cells in a steady-state condition and in a context of an infection. To study these cells in a well-defined mouse model, we generated OT-3 Τ cell receptor transgenic mice that express low avidity CD8+ Τ cells that are specific for the SIINFEKL epitope of the Ovalbumin antigen. We have been able to demonstrate that a large number of OT-3 CD8+ Τ cells survive negative selection in the thymus after encountering the self-antigen. Thus, low avidity OT-3 Τ cells are present in a window of selection comprised between positive and negative selection. This boundary defined as the affinity threshold is involved in the escape of some autoreactive low avidity OT-3 Τ cells. Once they circulate in the periphery, they are able to induce autoimmunity after stimulation during an infection, allowing us to allocate these cells as being non-tolerant and not in an anergic state in the periphery. We have also looked at the threshold of activation of low avidity OT-3 CD8+ Τ cells in the periphery and found that peptide ligands that are weaker than the native SIINFEKL epitope are able to activate OT-3 Τ cells during an infection and to differentiate them into effector and memory Τ cells. The data illustrate the impairment of negatively selecting low avidity autoreactive CD8+ Τ cells against a tissue-restricted antigen in the thymus and shows that these cells are fully competent upon an infection.
Resumo:
P130 A HIGH-RESOLUTION 2D/3D SEISMIC STUDY OF A THRUST FAULT ZONE IN LAKE GENEVA SWITZERLAND M. SCHEIDHAUER M. BERES D. DUPUY and F. MARILLIER Institute of Geophysics University of Lausanne 1015 Lausanne, Switzerland Summary A high-resolution three-dimensional (3D) seismic reflection survey has been conducted in Lake Geneva near the city of Lausanne Switzerland where the faulted molasse basement (Tertiary sandstones) is overlain by complex Quaternary sedimentary structures. Using a single 48-channel streamer an area of 1200 m x 600 m was surveyed in 10 days. With a 5-m shot spacing and a receiver spacing of 2.5 m in the inline direction and 7.5 m in the crossline direction, a 12-fold data coverage was achieved. A maximum penetration depth of ~150 m was achieved with a 15 cu. in. water gun operated at 140 bars. The multi-channel data allow the determination of an accurate velocity field for 3D processing, and they show particularly clean images of the fault zone and the overlying sediments in horizontal and vertical sections. In order to compare different sources, inline 55 was repeated with a 30/30 and a 15/15 cu. in. double-chamber air gun (Mini GI) operated at 100 and 80 bars, respectively. A maximum penetration depth of ~450 m was achieved with this source.
Resumo:
There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.
Resumo:
The Polochic and Motagua faults define the active plate boundary between the North American and Caribbean plates in central Guatemala. A splay of the Polochic Fault traverses the rapidly growing city of San Miguel Uspantan that is periodically affected by destructive earthquakes. This fault splay was located using a 2D electrical resistivity tomography (ERT) survey that also characterized the fault damage zone and evaluated the thickness and nature of recent deposits upon which most of the city is built. ERT images show the fault as a similar to 50 m wide, near-vertical low-resistivity anomaly, bounded within a few meters by high resistivity anomalies. Forward modeling reproduces the key aspects of the observed electrical resistivity data with remarkable fidelity thus defining the overall location, geometry, and internal structure of the fault zone as well as the affected lithologies. Our results indicate that the city is constructed on a similar to 20 m thick surficial layer consisting of poorly consolidated, highly porous, water-logged pumice. This soft layer is likely to amplify seismic waves and to liquefy upon moderate to strong ground shaking. The electrical conductivity as well as the major element chemistry of the groundwater provides evidence to suggest that the local aquifer might, at least in part, be fed by water rising along the fault. Therefore, the potential threat posed by this fault splay may not be limited to its seismic activity per se, but could be compounded its potential propensity to enhance seismic site effects by injecting water into the soft surficial sediments. The results of this study provide the basis for a rigorous analysis of seismic hazard and sustainable development of San Miguel Uspantan and illustrate the potential of ERT surveying for paleoseismic studies.
Resumo:
We have devised a program that allows computation of the power of F-test, and hence determination of appropriate sample and subsample sizes, in the context of the one-way hierarchical analysis of variance with fixed effects. The power at a fixed alternative is an increasing function of the sample size and of the subsample size. The program makes it easy to obtain the power of F-test for a range of values of sample and subsample sizes, and therefore the appropriate sizes based on a desired power. The program can be used for the 'ordinary' case of the one-way analysis of variance, as well as for hierarchical analysis of variance with two stages of sampling. Examples are given of the practical use of the program.
Resumo:
A lot of research in cognition and decision making suffers from a lack of formalism. The quantum probability program could help to improve this situation, but we wonder whether it would provide even more added value if its presumed focus on outcome models were complemented by process models that are, ideally, informed by ecological analyses and integrated into cognitive architectures.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
The Monte Perdido thrust fault (southern Pyrenees) consists of a 6-m-thick interval of intensely deformed clay-bearing rocks. The fault zone is affected by a pervasive pressure solution seam and numerous shear surfaces. Calcite extensional-shear veins are present along the shear surfaces. The angular relationships between the two structures indicate that shear surfaces developed at a high angle (70°) to the local principal maximum stress axis r1. Two main stages of deformation are present. The first stage corresponds to the development of calcite shear veins by a combination of shear surface reactivation and extensional mode I rupture. The second stage of deformation corresponds to chlorite precipitation along the previously reactivated shear surfaces. The pore fluid factor k computed for the two deformation episodes indicates high fluid pressures during the Monte Perdido thrust activity. During the first stage of deformation, the reactivation of the shear surface was facilitated by a suprahydrostatic fluid pressure with a pore fluid factor kv equal to 0.89. For the second stage, the fluid pressure remained still high (with a k value ranging between 0.77 and 0.84) even with the presence of weak chlorite along the shear surfaces. Furthermore, evidence of hydrostatic fluid pressure during calcite cement precipitation supports that incremental shear surface reactivations are correlated with cyclic fluid pressure fluctuations consis- tent with a fault-valve model.
Resumo:
The use of quantum dots (QDs) in the area of fingermark detection is currently receiving a lot of attention in the forensic literature. Most of the research efforts have been devoted to cadmium telluride (CdTe) quantum dots often applied as powders to the surfaces of interests. Both the use of cadmium and the nano size of these particles raise important issues in terms of health and safety. This paper proposes to replace CdTe QDs by zinc sulphide QDs doped with copper (ZnS:Cu) to address these issues. Zinc sulphide-copper doped QDs were successfully synthesized, characterized in terms of size and optical properties and optimized to be applied for the detection of impressions left in blood, where CdTe QDs proved to be efficient. Effectiveness of detection was assessed in comparison with CdTe QDs and Acid Yellow 7 (AY7, an effective blood reagent), using two series of depletive blood fingermarks from four donors prepared on four non-porous substrates, i.e. glass, transparent polypropylene, black polyethylene and aluminium foil. The marks were cut in half and processed separately with both reagents, leading to two comparison series (ZnS:Cu vs. CdTe, and ZnS:Cu vs. AY7). ZnS:Cu proved to be better than AY7 and at least as efficient as CdTe on most substrates. Consequently, copper-doped ZnS QDs constitute a valid substitute for cadmium-based QDs to detect blood marks on non-porous substrates and offer a safer alternative for routine use.
Resumo:
Between the cities of Domodossola and Locarno, the complex ``Centovalli Line'' tectonic zone of the Central Alps outlines deformation phases over a long period of time (probably starting similar to 30 Ma ago) and under variable P-T conditions. The last deformation phases developed gouge-bearing faults with a general E-W trend that crosscuts the roots of the Alpine Canavese zone and the Finero ultramafic body. Kinematic indicators show that the general motion was mainly dextral associated with back thrusting towards the S. The <2 mu m clay fractions of fault gouges from Centovalli Line consist mainly of illite, smectite and chlorite with varied illite-smectite, chlorite-smectite and chlorite-serpentine mixed-layers. Constrained with the illite crystallinity index, the thermal conditions induced by the tectonic activity show a gradual trend from anchizonal to diagenetic conditions. The <2 and <0.2 mu M clay fractions, and hydrothermal K-feldspar separates all provide K-Ar ages between 14.2 +/- 2.9 Ma and roughly 0 Ma, with major episodes at about 12,8, 6 and close to 0 Ma These ages set the recurrent tectonic activity and the associated fluid circulations between Upper Miocene and Recent. On the basis of the K-Ar ages and with a thermal gradient of 25-30 degrees C/km, the studied fault zones were located at a depth of 4-7 km. If they were active until now as observed in field, the exhumation was approximately 2.5-3.0 km for the last 12 Ma with a mean velocity of 0.4 mm/y. Comparison with available models on the recent Alpine evolution shows that the tectonic activity in the area relates to a continuum of the back-thrusting movements of the Canavese Line, and/or to several late-extensional phases of the Rhone-Simplon line. The Centovalli-Val Vigezzo zone therefore represents a major tectonic zone of the Central-Western Alps resulting from different interacting tectonic events. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
Numerous measurements by XRD of the Scherrer width at half-peak height (001 reflection of illite), coupled with analyses of clay-size assemblages, provide evidence for strong variations in the conditions of low temperature metamorphism in the Tethyan Himalaya metasediments between the Spiti river and the Tso Morari. Three sectors can be distinguished along the Spiti river-Tso Morari transect. In the SW, the Takling and Parang La area is characterised by a metamorphism around anchizone-epizone boundary conditions. Further north, in the Dutung area, the metamorphic grade abruptly decreases to weak diagenesis, with the presence of mixed-layered clay phases. At the end of the profile towards the NE, a progressive metamorphic increase up to greenschist facies is recorded, marked by the appearance of biotite and chloritoid. The combination of these data with the structural. observations permits to propose that a nappe stack has been crosscut by the younger Dutung-Thaktote extensional fault zone (DTFZ). The change in metamorphism across this zone helps to assess the displacements which occurred during synorogenic extension. In the SW and NE parts of the studied transect, a burial of 12 km has been estimated, assuming a geothermal gradient of 25 degrees C/km. In the SW part, this burial is due to the juxtaposition of the Shikar Beh and Mata nappes and in the NE part, solely to burial beneath the Mata nappe. In the central part of the profile, the effect of the DTFZ is to bring down diagenetic sediments in-between the two aforesaid metamorphic zones. The offset along the Dutung-Thaktote normal faults is estimated at 16 km.