67 resultados para mobile security
Resumo:
Secondary growth of the vasculature results in the thickening of plant structures and continuously produces xylem tissue, the major biological carbon sink. Little is known about the developmental control of this quantitative trait, which displays two distinct phases in Arabidopsis thaliana hypocotyls. The later phase of accelerated xylem expansion resembles the secondary growth of trees and is triggered upon flowering by an unknown, shoot-derived signal. We found that flowering-dependent hypocotyl xylem expansion is a general feature of herbaceous plants with a rosette growth habit. Flowering induction is sufficient to trigger xylem expansion in Arabidopsis. By contrast, neither flower formation nor elongation of the main inflorescence is required. Xylem expansion also does not depend on any particular flowering time pathway or absolute age. Through analyses of natural genetic variation, we found that ERECTA acts locally to restrict xylem expansion downstream of the gibberellin (GA) pathway. Investigations of mutant and transgenic plants indicate that GA and its signaling pathway are both necessary and sufficient to directly trigger enhanced xylogenesis. Impaired GA signaling did not affect xylem expansion systemically, suggesting that it acts downstream of the mobile cue. By contrast, the GA effect was graft transmissible, suggesting that GA itself is the mobile shoot-derived signal.
Resumo:
Introduction: The posterior inclination of the tibial component is an important factor that can affect the success of total knee arthroplasty. It can reduce the posterior impingement and thus increase the range of flexion, but it may also induce instability in flexion, anterior impingement between the polyethylene of postero-stabilizing knee prosthesis, and anterior conflict with the cortical bone and the stem. Although the problem is identified, there is still a debate on the ideal inclination angle and the surgical technique to avoid an excessive posterior inclination. The aim of this study was to predict the effect of a posterior inclination of the tibial component on the contact pattern on the tibial insert, using a numerical musculoskeletal model of the knee joint. Methods: A 3D finite element model of the knee joint was developed to simulate an active and loaded squat movement after total knee arthroplasty. Flexion was actively controlled by the quadriceps muscle and muscle activations were estimated from EMG data and were synchronized by a feedback algorithm. Two inclinations of the tibial tray were considered: a posterior inclination of 0° or 10°. During the entire range of flexion, the following quantities were calculated: the tibiofemoral and patello-femoral contact force, and the contact pattern on polyethylene insert. The antero-posterior displacement of the contact pattern was also measured. Abaqus 6.7 was used for all analyses. Results: The tibio-femoral and patello-femoral contact forces increased during flexion and reached respectively 4 and 7 BW (bodyweight) at 90° of flexion. They were slightly affected by the inclination of the tibial tray. Without posterior inclination, the contact pattern on the tibial insert remained centered. The contact pressure was lower than 5 MPa below 60° of flexion, but exceeded 20 MPa at 90° of flexion. The posterior inclination displaced the contact point posteriorly by 2 to 4 mm. Conclusion: The inclination of the tibial tray displaced the contactpattern towards the posterior border of the tibial insert. However, even for 10° of inclination, the contact center remained far from the posterior border (12 mm). There was no instability predicted for this movement.
Resumo:
Background It has been hypothesized that children and adolescents might be more vulnerable to possible health effects from mobile phone exposure than adults. We investigated whether mobile phone use is associated with brain tumor risk among children and adolescents. Methods CEFALO is a multicenter case-control study conducted in Denmark, Sweden, Norway, and Switzerland that includes all children and adolescents aged 7-19 years who were diagnosed with a brain tumor between 2004 and 2008. We conducted interviews, in person, with 352 case patients (participation rate: 83%) and 646 control subjects (participation rate: 71%) and their parents. Control subjects were randomly selected from population registries and matched by age, sex, and geographical region. We asked about mobile phone use and included mobile phone operator records when available. Odds ratios (ORs) for brain tumor risk and 95% confidence intervals (CIs) were calculated using conditional logistic regression models. Results Regular users of mobile phones were not statistically significantly more likely to have been diagnosed with brain tumors compared with nonusers (OR = 1.36; 95% CI = 0.92 to 2.02). Children who started to use mobile phones at least 5 years ago were not at increased risk compared with those who had never regularly used mobile phones (OR = 1.26, 95% CI = 0.70 to 2.28). In a subset of study participants for whom operator recorded data were available, brain tumor risk was related to the time elapsed since the mobile phone subscription was started but not to amount of use. No increased risk of brain tumors was observed for brain areas receiving the highest amount of exposure. Conclusion The absence of an exposure-response relationship either in terms of the amount of mobile phone use or by localization of the brain tumor argues against a causal association.
Resumo:
A mobile ad hoc network (MANET) is a decentralized and infrastructure-less network. This thesis aims to provide support at the system-level for developers of applications or protocols in such networks. To do this, we propose contributions in both the algorithmic realm and in the practical realm. In the algorithmic realm, we contribute to the field by proposing different context-aware broadcast and multicast algorithms in MANETs, namely six-shot broadcast, six-shot multicast, PLAN-B and ageneric algorithmic approach to optimize the power consumption of existing algorithms. For each algorithm we propose, we compare it to existing algorithms that are either probabilistic or context-aware, and then we evaluate their performance based on simulations. We demonstrate that in some cases, context-aware information, such as location or signal-strength, can improve the effciency. In the practical realm, we propose a testbed framework, namely ManetLab, to implement and to deploy MANET-specific protocols, and to evaluate their performance. This testbed framework aims to increase the accuracy of performance evaluation compared to simulations, while keeping the ease of use offered by the simulators to reproduce a performance evaluation. By evaluating the performance of different probabilistic algorithms with ManetLab, we observe that both simulations and testbeds should be used in a complementary way. In addition to the above original contributions, we also provide two surveys about system-level support for ad hoc communications in order to establish a state of the art. The first is about existing broadcast algorithms and the second is about existing middleware solutions and the way they deal with privacy and especially with location privacy. - Un réseau mobile ad hoc (MANET) est un réseau avec une architecture décentralisée et sans infrastructure. Cette thèse vise à fournir un support adéquat, au niveau système, aux développeurs d'applications ou de protocoles dans de tels réseaux. Dans ce but, nous proposons des contributions à la fois dans le domaine de l'algorithmique et dans celui de la pratique. Nous contribuons au domaine algorithmique en proposant différents algorithmes de diffusion dans les MANETs, algorithmes qui sont sensibles au contexte, à savoir six-shot broadcast,six-shot multicast, PLAN-B ainsi qu'une approche générique permettant d'optimiser la consommation d'énergie de ces algorithmes. Pour chaque algorithme que nous proposons, nous le comparons à des algorithmes existants qui sont soit probabilistes, soit sensibles au contexte, puis nous évaluons leurs performances sur la base de simulations. Nous montrons que, dans certains cas, des informations liées au contexte, telles que la localisation ou l'intensité du signal, peuvent améliorer l'efficience de ces algorithmes. Sur le plan pratique, nous proposons une plateforme logicielle pour la création de bancs d'essai, intitulé ManetLab, permettant d'implémenter, et de déployer des protocoles spécifiques aux MANETs, de sorte à évaluer leur performance. Cet outil logiciel vise à accroître la précision desévaluations de performance comparativement à celles fournies par des simulations, tout en conservant la facilité d'utilisation offerte par les simulateurs pour reproduire uneévaluation de performance. En évaluant les performances de différents algorithmes probabilistes avec ManetLab, nous observons que simulateurs et bancs d'essai doivent être utilisés de manière complémentaire. En plus de ces contributions principales, nous fournissons également deux états de l'art au sujet du support nécessaire pour les communications ad hoc. Le premier porte sur les algorithmes de diffusion existants et le second sur les solutions de type middleware existantes et la façon dont elles traitent de la confidentialité, en particulier celle de la localisation.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
In the context of demographic evolution, psychiatric care needs increase steadily in most western countries. Given the financial limitations, it is mandatory to establish appropriate care priorities in order to avoid psychiatric hospitalisations by assisting care providers, general practionners and nurses, at home or in the nursing homes. A crisis team has been established 18 months ago within the Division of old age psychiatry in Lausanne. The care program included immediate assistance in the community, assessement, crisis counseling, medication consultation and referral for psychiatric services providing an alternative to hospitalization. The first results indicate that this intervention is well accepted by the users and correspond to a real need.
Resumo:
The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.
Resumo:
BACKGROUND/AIM: With the evolving boundaries of sports science and greater understanding of the driving factors in the human performance physiology, one of the limiting factors has now become the technology. The growing scientific interest on the practical application of hypoxic training for intermittent activities such as team and racket sports legitimises the development of innovative technologies serving athletes in a sport-specific setting. METHODS: Description of a new mobile inflatable simulated hypoxic equipment. RESULTS: The system comprises two inflatable units-that is, a tunnel and a rectangular design, each with a 215 m(3) volume and a hypoxic trailer generating over 3000 Lpm of hypoxic air with FiO₂ between 0.21 and 0.10 (a simulated altitude up to 5100 m). The inflatable units offer a 45 m running lane (width=1.8 m and height=2.5 m) as well as a 8 m × 10 m dome tent. FiO₂ is stable within a range of 0.1% in normal conditions inside the tunnel. The air supplied is very dry-typically 10-15% relative humidity. CONCLUSIONS: This mobile inflatable simulated hypoxic equipment is a promising technological advance within sport sciences. It offers an opportunity for team-sport players to train under hypoxic conditions, both for repeating sprints (tunnel configuration) or small-side games (rectangular configuration).
Resumo:
Abstract In this thesis we present the design of a systematic integrated computer-based approach for detecting potential disruptions from an industry perspective. Following the design science paradigm, we iteratively develop several multi-actor multi-criteria artifacts dedicated to environment scanning. The contributions of this thesis are both theoretical and practical. We demonstrate the successful use of multi-criteria decision-making methods for technology foresight. Furthermore, we illustrate the design of our artifacts using build and-evaluate loops supported with a field study of the Swiss mobile payment industry. To increase the relevance of this study, we systematically interview key Swiss experts for each design iteration. As a result, our research provides a realistic picture of the current situation in the Swiss mobile payment market and reveals previously undiscovered weak signals for future trends. Finally, we suggest a generic design process for environment scanning.
Resumo:
Utilization behavior (UB) consists of reaching out and using objects in the environment in an automatic manner and out of context. This behavior has been correlated to frontal lobe dysfunction, especially of the right hemisphere. We describe a 60-year-old woman, affected by a glioblastoma located in the right frontal region, who presented with intermittent UB of the mobile phone as the main clinical manifestation of partial complex status epilepticus. Video/EEG studies showed a striking correlation between mobile phone utilization and ictal epileptic activity. Clinical and EEG findings were markedly reduced after the introduction of antiepileptic drugs. This case study suggests that UB may be added to the symptoms described for partial seizures originating from frontal areas.