160 resultados para Acoustic communication
Resumo:
The complex relationship between structural and functional connectivity, as measured by noninvasive imaging of the human brain, poses many unresolved challenges and open questions. Here, we apply analytic measures of network communication to the structural connectivity of the human brain and explore the capacity of these measures to predict resting-state functional connectivity across three independently acquired datasets. We focus on the layout of shortest paths across the network and on two communication measures-search information and path transitivity-which account for how these paths are embedded in the rest of the network. Search information is an existing measure of information needed to access or trace shortest paths; we introduce path transitivity to measure the density of local detours along the shortest path. We find that both search information and path transitivity predict the strength of functional connectivity among both connected and unconnected node pairs. They do so at levels that match or significantly exceed path length measures, Euclidean distance, as well as computational models of neural dynamics. This capacity suggests that dynamic couplings due to interactions among neural elements in brain networks are substantially influenced by the broader network context adjacent to the shortest communication pathways.
Resumo:
PURPOSE: We investigated the influence of beam modulation on treatment planning by comparing four available stereotactic radiosurgery (SRS) modalities: Gamma-Knife-Perfexion, Novalis-Tx Dynamic-Conformal-Arc (DCA) and Dynamic-Multileaf-Collimation-Intensity-Modulated-radiotherapy (DMLC-IMRT), and Cyberknife. MATERIAL AND METHODS: Patients with arteriovenous malformation (n = 10) or acoustic neuromas (n = 5) were planned with different treatment modalities. Paddick conformity index (CI), dose heterogeneity (DH), gradient index (GI) and beam-on time were used as dosimetric indices. RESULTS: Gamma-Knife-Perfexion can achieve high degree of conformity (CI = 0.77 ± 0.04) with limited low-doses (GI = 2.59 ± 0.10) surrounding the inhomogeneous dose distribution (D(H) = 0.84 ± 0.05) at the cost of treatment time (68.1 min ± 27.5). Novalis-Tx-DCA improved this inhomogeneity (D(H) = 0.30 ± 0.03) and treatment time (16.8 min ± 2.2) at the cost of conformity (CI = 0.66 ± 0.04) and Novalis-TX-DMLC-IMRT improved the DCA CI (CI = 0.68 ± 0.04) and inhomogeneity (D(H) = 0.18 ± 0.05) at the cost of low-doses (GI = 3.94 ± 0.92) and treatment time (21.7 min ± 3.4) (p<0.01). Cyberknife achieved comparable conformity (CI = 0.77 ± 0.06) at the cost of low-doses (GI = 3.48 ± 0.47) surrounding the homogeneous (D(H) = 0.22 ± 0.02) dose distribution and treatment time (28.4min±8.1) (p<0.01). CONCLUSIONS: Gamma-Knife-Perfexion will comply with all SRS constraints (high conformity while minimizing low-dose spread). Multiple focal entries (Gamma-Knife-Perfexion and Cyberknife) will achieve better conformity than High-Definition-MLC of Novalis-Tx at the cost of treatment time. Non-isocentric beams (Cyberknife) or IMRT-beams (Novalis-Tx-DMLC-IMRT) will spread more low-dose than multiple isocenters (Gamma-Knife-Perfexion) or dynamic arcs (Novalis-Tx-DCA). Inverse planning and modulated fluences (Novalis-Tx-DMLC-IMRT and CyberKnife) will deliver the most homogeneous treatment. Furthermore, Linac-based systems (Novalis and Cyberknife) can perform image verification at the time of treatment delivery.
Resumo:
This study investigated the effectiveness of modules involving standardized patients and role-plays on training communication skills. The first module involved standardized patients and an Objective Structured Clinical Examination (OSCE); the second module consisted of peer role-plays and a written examination. A randomized posttest-only control group design with first-year nursing students was used. The intervention group received one-to-one communication training with direct oral feedback from the standardized patient. The control group had training with peer role-playing and mutual feedback. The posttest involved students' rating their self-efficacy, and real patients and clinical supervisors evaluated their communication skills. No significant differences were found between self-efficacy and patient ratings. However, the clinical supervisors rated the intervention group's communication skills to be significantly (p < 0.0001) superior. Assessments by clinical supervisors indicate that communication training modules including standardized patients and an OSCE are superior to communication training modules with peer role-playing.
Resumo:
SUMMARY Inflammation has evolved as a mechanism to defend the body against invading microorganisms and to respond to injury. It requires the coordinated response of a large number of cell types from the whole organism in a time- and space-dependent fashion. This coordination involves several cell-cell communication mechanisms. Exchange of humoral mediators such as cytokines is a major one. Moreover, direct contact between cells happens and plays a primordial role, for example when macrophages present antigens to lymphocytes. Contact between endothelial cells and leucocytes occurs when the latter cross the blood vessel barrier and transmigrate to the inflammatory site. A particular way by which cells communicate with each other in the course of inflammation, which at this time starts to gain attention, is the intercellular communication mediated by gap junctions. Gap junctions are channels providing a direct pathway (i.e. without transit through the extracellular space) for the diffusion of small molecules between adjacent cells. This process is known as gap junctional intercellular communication (GJIC). The general aim of this thesis was to study a possible involvement of GJIC in the pathophysiology of inflammation. A first part of the work was dedicated to study the implication of GJIC in the modification of vascular endothelial function by inflammation. In a second part, we were interested in the possible role of GJIC in the transmigration of neutrophil polymorphonuclear leucocytes through the endothelium. The main positive finding of this work is that acute inflammation preferentially modulates the expression of connexin 40 (Cx40), a gap junction protein specifically expressed in vascular endothelium. The modulation could be towards overexpression (aortic endothelium of septic rats) or towards downregulation (acutely inflamed mouse lung). We put a lot of efforts in search of possible functions of these modulations, in two directions: a potential protective role of Cx40 increased expression against sepsis-induced endothelial dysfunction, and a facilitating role of Cx40 decreased expression in neutrophil transmigration. To pursue both directions, it seemed logical to study the impact of Cx40 deletion using knock-out mice. Concerning the potential protective role of Cx40 overexpression we encountered a roadblock as we observed, in the aorta, a Cx40 downregulation in wild type mouse whereas Cx40 was upregulated in the rat. Regarding the second direction and using an in vivo approach, we observed that pulmonary neutrophil transmigration was not affected by the genetic deletion of Cx40. In spite of their negative nature, these results are the very first ones regarding the potential implication of GJIC concerning leucocyte transmigration in vivo. Because this process involves such tight cell-cell physical contacts, the hypothesis for a role of GJIC remains attractive.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
Constatant que la formation des enseignants aux technologies de l'information et de la communication (TIC) pose des problèmes spécifiques, cet article a pour but d'engager une réflexion sur ce thème. Nos réflexions s'appuient sur une expérience de formation réalisée dans 23 écoles professionnelles suisses engagées dans un programme national de soutien à l'utilisation pédagogique des TIC. L'article décrit la manière dont le dispositif de formation prévu a été mis en pratique, les difficultés auxquelles il a donné lieu et les réponses que les acteurs ont élaborées pour faire face à ces difficultés. Nous montrons qu'une analyse du déroulement effectif d'un dispositif de formation et des transformations qu'il subit constitue un élément essentiel pour orienter les futures actions de formation et penser la place des apprenants dans un dispositif de formation.