134 resultados para Mobile Communication
Resumo:
A mobile ad hoc network (MANET) is a decentralized and infrastructure-less network. This thesis aims to provide support at the system-level for developers of applications or protocols in such networks. To do this, we propose contributions in both the algorithmic realm and in the practical realm. In the algorithmic realm, we contribute to the field by proposing different context-aware broadcast and multicast algorithms in MANETs, namely six-shot broadcast, six-shot multicast, PLAN-B and ageneric algorithmic approach to optimize the power consumption of existing algorithms. For each algorithm we propose, we compare it to existing algorithms that are either probabilistic or context-aware, and then we evaluate their performance based on simulations. We demonstrate that in some cases, context-aware information, such as location or signal-strength, can improve the effciency. In the practical realm, we propose a testbed framework, namely ManetLab, to implement and to deploy MANET-specific protocols, and to evaluate their performance. This testbed framework aims to increase the accuracy of performance evaluation compared to simulations, while keeping the ease of use offered by the simulators to reproduce a performance evaluation. By evaluating the performance of different probabilistic algorithms with ManetLab, we observe that both simulations and testbeds should be used in a complementary way. In addition to the above original contributions, we also provide two surveys about system-level support for ad hoc communications in order to establish a state of the art. The first is about existing broadcast algorithms and the second is about existing middleware solutions and the way they deal with privacy and especially with location privacy. - Un réseau mobile ad hoc (MANET) est un réseau avec une architecture décentralisée et sans infrastructure. Cette thèse vise à fournir un support adéquat, au niveau système, aux développeurs d'applications ou de protocoles dans de tels réseaux. Dans ce but, nous proposons des contributions à la fois dans le domaine de l'algorithmique et dans celui de la pratique. Nous contribuons au domaine algorithmique en proposant différents algorithmes de diffusion dans les MANETs, algorithmes qui sont sensibles au contexte, à savoir six-shot broadcast,six-shot multicast, PLAN-B ainsi qu'une approche générique permettant d'optimiser la consommation d'énergie de ces algorithmes. Pour chaque algorithme que nous proposons, nous le comparons à des algorithmes existants qui sont soit probabilistes, soit sensibles au contexte, puis nous évaluons leurs performances sur la base de simulations. Nous montrons que, dans certains cas, des informations liées au contexte, telles que la localisation ou l'intensité du signal, peuvent améliorer l'efficience de ces algorithmes. Sur le plan pratique, nous proposons une plateforme logicielle pour la création de bancs d'essai, intitulé ManetLab, permettant d'implémenter, et de déployer des protocoles spécifiques aux MANETs, de sorte à évaluer leur performance. Cet outil logiciel vise à accroître la précision desévaluations de performance comparativement à celles fournies par des simulations, tout en conservant la facilité d'utilisation offerte par les simulateurs pour reproduire uneévaluation de performance. En évaluant les performances de différents algorithmes probabilistes avec ManetLab, nous observons que simulateurs et bancs d'essai doivent être utilisés de manière complémentaire. En plus de ces contributions principales, nous fournissons également deux états de l'art au sujet du support nécessaire pour les communications ad hoc. Le premier porte sur les algorithmes de diffusion existants et le second sur les solutions de type middleware existantes et la façon dont elles traitent de la confidentialité, en particulier celle de la localisation.
Resumo:
The complex relationship between structural and functional connectivity, as measured by noninvasive imaging of the human brain, poses many unresolved challenges and open questions. Here, we apply analytic measures of network communication to the structural connectivity of the human brain and explore the capacity of these measures to predict resting-state functional connectivity across three independently acquired datasets. We focus on the layout of shortest paths across the network and on two communication measures-search information and path transitivity-which account for how these paths are embedded in the rest of the network. Search information is an existing measure of information needed to access or trace shortest paths; we introduce path transitivity to measure the density of local detours along the shortest path. We find that both search information and path transitivity predict the strength of functional connectivity among both connected and unconnected node pairs. They do so at levels that match or significantly exceed path length measures, Euclidean distance, as well as computational models of neural dynamics. This capacity suggests that dynamic couplings due to interactions among neural elements in brain networks are substantially influenced by the broader network context adjacent to the shortest communication pathways.
Resumo:
This study investigated the effectiveness of modules involving standardized patients and role-plays on training communication skills. The first module involved standardized patients and an Objective Structured Clinical Examination (OSCE); the second module consisted of peer role-plays and a written examination. A randomized posttest-only control group design with first-year nursing students was used. The intervention group received one-to-one communication training with direct oral feedback from the standardized patient. The control group had training with peer role-playing and mutual feedback. The posttest involved students' rating their self-efficacy, and real patients and clinical supervisors evaluated their communication skills. No significant differences were found between self-efficacy and patient ratings. However, the clinical supervisors rated the intervention group's communication skills to be significantly (p < 0.0001) superior. Assessments by clinical supervisors indicate that communication training modules including standardized patients and an OSCE are superior to communication training modules with peer role-playing.
Resumo:
SUMMARY Inflammation has evolved as a mechanism to defend the body against invading microorganisms and to respond to injury. It requires the coordinated response of a large number of cell types from the whole organism in a time- and space-dependent fashion. This coordination involves several cell-cell communication mechanisms. Exchange of humoral mediators such as cytokines is a major one. Moreover, direct contact between cells happens and plays a primordial role, for example when macrophages present antigens to lymphocytes. Contact between endothelial cells and leucocytes occurs when the latter cross the blood vessel barrier and transmigrate to the inflammatory site. A particular way by which cells communicate with each other in the course of inflammation, which at this time starts to gain attention, is the intercellular communication mediated by gap junctions. Gap junctions are channels providing a direct pathway (i.e. without transit through the extracellular space) for the diffusion of small molecules between adjacent cells. This process is known as gap junctional intercellular communication (GJIC). The general aim of this thesis was to study a possible involvement of GJIC in the pathophysiology of inflammation. A first part of the work was dedicated to study the implication of GJIC in the modification of vascular endothelial function by inflammation. In a second part, we were interested in the possible role of GJIC in the transmigration of neutrophil polymorphonuclear leucocytes through the endothelium. The main positive finding of this work is that acute inflammation preferentially modulates the expression of connexin 40 (Cx40), a gap junction protein specifically expressed in vascular endothelium. The modulation could be towards overexpression (aortic endothelium of septic rats) or towards downregulation (acutely inflamed mouse lung). We put a lot of efforts in search of possible functions of these modulations, in two directions: a potential protective role of Cx40 increased expression against sepsis-induced endothelial dysfunction, and a facilitating role of Cx40 decreased expression in neutrophil transmigration. To pursue both directions, it seemed logical to study the impact of Cx40 deletion using knock-out mice. Concerning the potential protective role of Cx40 overexpression we encountered a roadblock as we observed, in the aorta, a Cx40 downregulation in wild type mouse whereas Cx40 was upregulated in the rat. Regarding the second direction and using an in vivo approach, we observed that pulmonary neutrophil transmigration was not affected by the genetic deletion of Cx40. In spite of their negative nature, these results are the very first ones regarding the potential implication of GJIC concerning leucocyte transmigration in vivo. Because this process involves such tight cell-cell physical contacts, the hypothesis for a role of GJIC remains attractive.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
In the context of demographic evolution, psychiatric care needs increase steadily in most western countries. Given the financial limitations, it is mandatory to establish appropriate care priorities in order to avoid psychiatric hospitalisations by assisting care providers, general practionners and nurses, at home or in the nursing homes. A crisis team has been established 18 months ago within the Division of old age psychiatry in Lausanne. The care program included immediate assistance in the community, assessement, crisis counseling, medication consultation and referral for psychiatric services providing an alternative to hospitalization. The first results indicate that this intervention is well accepted by the users and correspond to a real need.
Resumo:
Constatant que la formation des enseignants aux technologies de l'information et de la communication (TIC) pose des problèmes spécifiques, cet article a pour but d'engager une réflexion sur ce thème. Nos réflexions s'appuient sur une expérience de formation réalisée dans 23 écoles professionnelles suisses engagées dans un programme national de soutien à l'utilisation pédagogique des TIC. L'article décrit la manière dont le dispositif de formation prévu a été mis en pratique, les difficultés auxquelles il a donné lieu et les réponses que les acteurs ont élaborées pour faire face à ces difficultés. Nous montrons qu'une analyse du déroulement effectif d'un dispositif de formation et des transformations qu'il subit constitue un élément essentiel pour orienter les futures actions de formation et penser la place des apprenants dans un dispositif de formation.