928 resultados para PHYSICAL PROTECTION DEVICES
Resumo:
L’évolution récente des commutateurs de sélection de longueurs d’onde (WSS -Wavelength Selective Switch) favorise le développement du multiplexeur optique d’insertionextraction reconfigurable (ROADM - Reconfigurable Optical Add/Drop Multiplexers) à plusieurs degrés sans orientation ni coloration, considéré comme un équipement fort prometteur pour les réseaux maillés du futur relativement au multiplexage en longueur d’onde (WDM -Wavelength Division Multiplexing ). Cependant, leur propriété de commutation asymétrique complique la question de l’acheminement et de l’attribution des longueur d’ondes (RWA - Routing andWavelength Assignment). Or la plupart des algorithmes de RWA existants ne tiennent pas compte de cette propriété d’asymétrie. L’interruption des services causée par des défauts d’équipements sur les chemins optiques (résultat provenant de la résolution du problème RWA) a pour conséquence la perte d’une grande quantité de données. Les recherches deviennent ainsi incontournables afin d’assurer la survie fonctionnelle des réseaux optiques, à savoir, le maintien des services, en particulier en cas de pannes d’équipement. La plupart des publications antérieures portaient particulièrement sur l’utilisation d’un système de protection permettant de garantir le reroutage du trafic en cas d’un défaut d’un lien. Cependant, la conception de la protection contre le défaut d’un lien ne s’avère pas toujours suffisante en termes de survie des réseaux WDM à partir de nombreux cas des autres types de pannes devenant courant de nos jours, tels que les bris d’équipements, les pannes de deux ou trois liens, etc. En outre, il y a des défis considérables pour protéger les grands réseaux optiques multidomaines composés de réseaux associés à un domaine simple, interconnectés par des liens interdomaines, où les détails topologiques internes d’un domaine ne sont généralement pas partagés à l’extérieur. La présente thèse a pour objectif de proposer des modèles d’optimisation de grande taille et des solutions aux problèmes mentionnés ci-dessus. Ces modèles-ci permettent de générer des solutions optimales ou quasi-optimales avec des écarts d’optimalité mathématiquement prouvée. Pour ce faire, nous avons recours à la technique de génération de colonnes afin de résoudre les problèmes inhérents à la programmation linéaire de grande envergure. Concernant la question de l’approvisionnement dans les réseaux optiques, nous proposons un nouveau modèle de programmation linéaire en nombres entiers (ILP - Integer Linear Programming) au problème RWA afin de maximiser le nombre de requêtes acceptées (GoS - Grade of Service). Le modèle résultant constitue celui de l’optimisation d’un ILP de grande taille, ce qui permet d’obtenir la solution exacte des instances RWA assez grandes, en supposant que tous les noeuds soient asymétriques et accompagnés d’une matrice de connectivité de commutation donnée. Ensuite, nous modifions le modèle et proposons une solution au problème RWA afin de trouver la meilleure matrice de commutation pour un nombre donné de ports et de connexions de commutation, tout en satisfaisant/maximisant la qualité d’écoulement du trafic GoS. Relativement à la protection des réseaux d’un domaine simple, nous proposons des solutions favorisant la protection contre les pannes multiples. En effet, nous développons la protection d’un réseau d’un domaine simple contre des pannes multiples, en utilisant les p-cycles de protection avec un chemin indépendant des pannes (FIPP - Failure Independent Path Protecting) et de la protection avec un chemin dépendant des pannes (FDPP - Failure Dependent Path-Protecting). Nous proposons ensuite une nouvelle formulation en termes de modèles de flots pour les p-cycles FDPP soumis à des pannes multiples. Le nouveau modèle soulève un problème de taille, qui a un nombre exponentiel de contraintes en raison de certaines contraintes d’élimination de sous-tour. Par conséquent, afin de résoudre efficacement ce problème, on examine : (i) une décomposition hiérarchique du problème auxiliaire dans le modèle de décomposition, (ii) des heuristiques pour gérer efficacement le grand nombre de contraintes. À propos de la protection dans les réseaux multidomaines, nous proposons des systèmes de protection contre les pannes d’un lien. Tout d’abord, un modèle d’optimisation est proposé pour un système de protection centralisée, en supposant que la gestion du réseau soit au courant de tous les détails des topologies physiques des domaines. Nous proposons ensuite un modèle distribué de l’optimisation de la protection dans les réseaux optiques multidomaines, une formulation beaucoup plus réaliste car elle est basée sur l’hypothèse d’une gestion de réseau distribué. Ensuite, nous ajoutons une bande pasiv sante partagée afin de réduire le coût de la protection. Plus précisément, la bande passante de chaque lien intra-domaine est partagée entre les p-cycles FIPP et les p-cycles dans une première étude, puis entre les chemins pour lien/chemin de protection dans une deuxième étude. Enfin, nous recommandons des stratégies parallèles aux solutions de grands réseaux optiques multidomaines. Les résultats de l’étude permettent d’élaborer une conception efficace d’un système de protection pour un très large réseau multidomaine (45 domaines), le plus large examiné dans la littérature, avec un système à la fois centralisé et distribué.
Resumo:
Essai doctoral à la Faculté de Psychologie en vue de l’obtention du grade de Doctorat en Psychologie option clinique
Resumo:
Les technologies de stimulations transcrâniennes – tel que la tDCS ou la TMS – présentent à l’heure actuelle d’intéressantes perspectives thérapeutiques, tout comme diverses améliorations cognitives chez le sujet « non-malade » dont découlent des applications neuroamélioratives, plus ou moins imminentes, en dehors du cadre clinique ou investigatoire. Est proposé ici d’analyser les risques associés à ces applications, détournées des objectifs premiers de recherche, et aux préoccupations éthiques qui les accompagnent (autonomie, justice, intégrité physique), via un concept généralement associé aux recherches avec des perspectives de sécurité nationale et associées à un niveau de risque élevé. Révisant la trivialité d’une définition dichotomique aux usages « bons » et « mauvais », est proposé d’étendre le concept de « double-usage » pour l’appliquer à la neuroamélioration comme un mésusage de la recherche en neurosciences. Faisant référence au conflit entre, d’une part, le respect de la liberté académique et, d’autre part, la protection de la sécurité et de la santé publique, ce concept s’avère être un outil diagnostique pertinent pour l’évaluation des risques associés à l’usage mélioratif desdites technologies, et plus particulièrement de la tDCS, afin d’alimenter la réflexion sur la régulation de ces dispositifs en amont de leur utilisation, selon un principe de précaution inhérent au double-usage de la recherche. Ce concept permet ainsi de réfléchir à la mise en place d’une gouvernance proactive et contextualisée impliquant une responsabilité partagée d’un large panel d’acteurs, nécessaire au vu des avancées rapides du domaine des neurosciences et de l’imminence de l’arrivée sur le marché de ces dispositifs.
Resumo:
Cyber Physical systems (CPS) connect the physical world with cyber world. The events happening in the real world is enormous and most of it go unnoticed and information is lost. CPS enables to embed tiny smart devices to capture the data and send it to Internet for further processing. The entire set-up call for lots of challenges and open new research problems. This talk is a journey through the landscape of research problems in this emerging area.
Resumo:
Since no physical system can ever be completely isolated from its environment, the study of open quantum systems is pivotal to reliably and accurately control complex quantum systems. In practice, reliability of the control field needs to be confirmed via certification of the target evolution while accuracy requires the derivation of high-fidelity control schemes in the presence of decoherence. In the first part of this thesis an algebraic framework is presented that allows to determine the minimal requirements on the unique characterisation of arbitrary unitary gates in open quantum systems, independent on the particular physical implementation of the employed quantum device. To this end, a set of theorems is devised that can be used to assess whether a given set of input states on a quantum channel is sufficient to judge whether a desired unitary gate is realised. This allows to determine the minimal input for such a task, which proves to be, quite remarkably, independent of system size. These results allow to elucidate the fundamental limits regarding certification and tomography of open quantum systems. The combination of these insights with state-of-the-art Monte Carlo process certification techniques permits a significant improvement of the scaling when certifying arbitrary unitary gates. This improvement is not only restricted to quantum information devices where the basic information carrier is the qubit but it also extends to systems where the fundamental informational entities can be of arbitary dimensionality, the so-called qudits. The second part of this thesis concerns the impact of these findings from the point of view of Optimal Control Theory (OCT). OCT for quantum systems utilises concepts from engineering such as feedback and optimisation to engineer constructive and destructive interferences in order to steer a physical process in a desired direction. It turns out that the aforementioned mathematical findings allow to deduce novel optimisation functionals that significantly reduce not only the required memory for numerical control algorithms but also the total CPU time required to obtain a certain fidelity for the optimised process. The thesis concludes by discussing two problems of fundamental interest in quantum information processing from the point of view of optimal control - the preparation of pure states and the implementation of unitary gates in open quantum systems. For both cases specific physical examples are considered: for the former the vibrational cooling of molecules via optical pumping and for the latter a superconducting phase qudit implementation. In particular, it is illustrated how features of the environment can be exploited to reach the desired targets.
Resumo:
This paper presents a study of connection availability in GMPLS over optical transport networks (OTN) taking into account different network topologies. Two basic path protection schemes are considered and compared with the no protection case. The selected topologies are heterogeneous in geographic coverage, network diameter, link lengths, and average node degree. Connection availability is also computed considering the reliability data of physical components and a well-known network availability model. Results show several correspondences between suitable path protection algorithms and several network topology characteristics
Resumo:
Background: Sexual risk behaviors associated with poor information on sexuality have contributed to major public health problems in the area of sexual and reproductive health in teenagers and young adults in Colombia. Objective: To measure the perception of changes in sexual and reproductive risk behavior after the use of a teleconsultation service via mobile devices in a sample of young adults. Methods: A before and after observational study was designed, where a mobile application to inquire about sexual and reproductive health was developed. The perception of changes in sexual and reproductive health risk behaviors in a sample of young adults after the use of the application was measured using the validated survey “Family Health International (FHI) – Behavioral Surveillance Survey (BSS) – Survey for Adults between 15 to 40 Years”. Non-probabilistic convenience recruitment was undertaken through the study´s web page. Participants answered the survey online before and after the use of the mobile application for a six month period (intervention). For the inferential analysis, data was divided into three groups (dichotomous data, discrete quantitative data, and ordinal data), to compare the results of the questions between the first and the second survey. For all tests, a confidence interval of 95% was established. For dichotomous data, the Chi-squared test was used. For quantitative data, we used the Student’s t-test, and for ordinal data, the Mann-Whitney-Wilcoxon test. Results: A total of 257 subjects were registered in the study and met the selection criteria. The pre-intervention survey was answered by 232 subjects, and 127 completely answered the post-intervention survey, of which 54.3% did not use the application, leaving an effective population of 58 subjects for analysis. 53% (n=31) were female, and 47% (n=27) were male. The mean age was 21 years, ranging between 18 and 40 years. The differences between the answers on the first and the second survey were not statistically significant. The main risk behaviors identified in the population were homosexual relations, non-use of condoms, sexual relations with non-regular and commercial partners, the use of psychoactive substances, and ignorance about the symptoms of sexually transmitted diseases and HIV transmission. Conclusions: Although there were no differences between the pre- and post-intervention results, the study revealed different risk behaviors among the participating subjects. These findings highlight the importance of promoting educational strategies on this matter and the importance of providing patients with easily accessible tools with reliable health information.
Resumo:
In a vault on the outskirts of Paris, a cylinder of platinum-iridium sits in a safe under three layers of glass. It is the kilogram, kept by the Bureau International des Poids et Mesures (BIPM), which is the international home of metrology. Metrology is the science of measurement, and it is of fundamental importance to us all. It is essential for trade, commerce, navigation, transport, communication, surveying, engineering, and construction. It is essential for medical diagnosis and treatment, health and safety, food and consumer protection, and for preserving the environment—e.g., measuring ozone in the atmosphere. Many of these applications are of particular relevance to chemistry and thus to IUPAC. In all these activities we need to make measurements reliably—to an appropriate and known level of uncertainty. The financial implications of metrology are enormous. In the United States, for example, some 15% of the gross domestic product is spent on healthcare, involving reliable quantitative measurements for both diagnosis and treatment.
Resumo:
A method to map all the variants of the IEEE 802.11 MAC frames into the Multiband OFDM based ECMA-368 Physical standard is proposed, without contravening the standard. The transportation of IEEE 802.11 MAC frames over ECMA-368 allows for the migration current of Wireless LAN applications towards a Wireless Personal Area Network (WPAN) solution. This system benefits the Consumer Electronics Market as the high data-rate WPAN is capable of transporting broadcast-quality video while the same system can also transport existing applications available today, maintaining existing effort, products and backward-compatibility(1).
Resumo:
E-reading devices such as The Kindle have rapidly secured a significant place in a number of societies as at least one major platform for reading. To some extent they are part of the overarching move towards a fully digitised world but they have a distinctiveness in being deliberately “book-like”. Teachers generally have some suspicion towards “New Media”, especially when it challenges their established practice and nothing dominates the school more than the physical book. What may be the challenges but also the benefits of e-readers to teachers and students? What may be the particular challenges to those teachers who are, traditionally, the guardians of the book, that is the teachers of mother tongue literature? This article reports on a survey of English teachers in England to gauge their reactions to e-readers, both personally and professionally and describes their speculations about the place of e-readers in schools in the future. There is a mixed reaction with some teachers concerned about the demise of the book and the potential negative impact on reading. However, the majority welcome e-readers as a dynamic element within the reading environment with particular potential to enthuse reluctant readers and those with special or linguistic needs. They also, some grudgingly, view the fact that reading using this form of technology appeals to the “e-generation” and may succeed in making reading “cool”. This form of technology is, ironically (given that it appears to threaten traditional books) likely to be rapidly adopted in classrooms.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Defects are usually present in organic polymer films and are commonly invoked to explain the low efficiency obtained in organic-based optoelectronic devices. We propose that controlled insertion of substitutional impurities may, on the contrary, tune the optoelectronic properties of the underivatized organic material and, in the case studied here, maximize the efficiency of a solar cell. We investigate a specific oxygen-impurity substitution, the keto-defect -(CH(2)-C=O)- in underivatized crystalline poly(p-phenylenevinylene) (PPV), and its impact on the electronic structure of the bulk film, through a combined classical (force-field) and quantum mechanical (DFT) approach. We find defect states which suggest a spontaneous electron hole separation typical of a donor acceptor interface, optimal for photovoltaic devices. Furthermore, the inclusion of oxygen impurities does not introduce defect states in the gap and thus, contrary to standard donor-acceptor systems, should preserve the intrinsic high open circuit voltage (V(oc)) that may be extracted from PPV-based devices.
Resumo:
We describe a simple and efficient strategy to fabricate enzymatic devices based on the deposition of glucose oxidase on aligned and highly oriented CoNiMo metallic nanowires. CoNiMo nanowires with an average diameter of 200 nm and length of 50 mu m were electrodeposited on Au-covered alumina substrates via electrodeposition, using alumina membranes as templates. Enzyme-modified electrodes were fabricated via enzyme immobilization using a cross-linker. To minimize nonspecific reactions in the presence of interfering agents, a permselective membrane composed of poly(vinylsulfonic acid) and polyamidoamine dendrimer was deposited via electrostatic interaction. The formation of hydrogen peroxide as a product of the enzymatic reaction was monitored at low overpotential, 0.0 V (vs Ag/AgCl). The detection limit was estimated at 22 mu M under an applied potential of 0.0 V. The apparent Michaelis-Menten constant determined from the Lineweaver-Burke plot was 2 mM.
Resumo:
The concern related to the environmental degradation and to the exhaustion of natural resources has induced the research on biodegradable materials obtained from renewable sources, which involves fundamental properties and general application. In this context, we have fabricated thin films of lignins, which were extracted from sugar cane bagasse via modified organosolv process using ethanol as organic solvent. The films were made using the vacuum thermal evaporation technique (PVD, physical vapor deposition) grown up to 120 nm. The main objective was to explore basic properties such as electrical and surface morphology and the sensing performance of these lignins as transducers. The PVD film growth was monitored via ultraviolet-visible (UV-vis) absorption spectroscopy and quartz crystal microbalance, revealing a linear relationship between absorbance and film thickness. The 120 nm lignin PVD film morphology presented small aggregates spread all over the film surface on the nanometer scale (atomic force microscopy, AFM) and homogeneous on the micrometer scale (optical microscopy). The PVD films were deposited onto Au interdigitated electrode (IDE) for both electrical characterization and sensing experiments. In the case of electrical characterization, current versus voltage (I vs V) dc measurements were carried out for the Au IDE coated with 120 nm lignin PVD film, leading to a conductivity of 3.6 x 10(-10) S/m. Using impedance spectroscopy, also for the Au IDE coated with the 120 nm lignin PVD film, dielectric constant of 8.0, tan delta of 3.9 x 10(-3)) and conductivity of 1.75 x 10(-9) S/m were calculated at 1 kHz. As a proof-of-principle, the application of these lignins as transducers in sensing devices was monitored by both impedance spectroscopy (capacitance vs frequency) and I versus time dc measurements toward aniline vapor (saturated atmosphere). The electrical responses showed that the sensing units are sensible to aniline vapor with the process being reversible. AFM images conducted directly onto the sensing units (Au IDE coated with 120 nm lignin PVD film) before and after the sensing experiments showed a decrease in the PVD film roughness from 5.8 to 3.2 nm after exposing to aniline.
Resumo:
Model Predictive Control (MPC) is a control method that solves in real time an optimal control problem over a finite horizon. The finiteness of the horizon is both the reason of MPC's success and its main limitation. In operational water resources management, MPC has been in fact successfully employed for controlling systems with a relatively short memory, such as canals, where the horizon length is not an issue. For reservoirs, which have generally a longer memory, MPC applications are presently limited to short term management only. Short term reservoir management can be effectively used to deal with fast process, such as floods, but it is not capable of looking sufficiently ahead to handle long term issues, such as drought. To overcome this limitation, we propose an Infinite Horizon MPC (IH-MPC) solution that is particularly suitable for reservoir management. We propose to structure the input signal by use of orthogonal basis functions, therefore reducing the optimization argument to a finite number of variables, and making the control problem solvable in a reasonable time. We applied this solution for the management of the Manantali Reservoir. Manantali is a yearly reservoir located in Mali, on the Senegal river, affecting water systems of Mali, Senegal, and Mauritania. The long term horizon offered by IH-MPC is necessary to deal with the strongly seasonal climate of the region.