979 resultados para Modèle filtre-rectification-filtre


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have investigated optical and transport properties of the molecular structure 2,3,4,5-tetraphenyl-1-phenylethynyl-cyclopenta-2,4-dienol experimentally and theoretically. The optical spectrum was calculated using Hartree-Fock-intermediate neglect of differential overlap-configuration interaction model. The experimental photoluminescence spectrum showed a peak around 470nm which was very well described by the modeling. Electronic transport measurements showed a diode-like effect with a strong current rectification. A phenomenological microscopic model based on non-equilibrium Green's function technique was proposed and a very good description electronic transport was obtained. (C) 2012 American Institute of Physics. [http://dx.doi.org/10.1063/1.4767457]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Les dépressions chroniques sont fréquentes et souvent traitées par des approches traditionnelles. Cet article vise à présenter la nature spécifique de la psychopathologie et un traitement spécifiquement adapté à ces patients avec dépression chronique. Nous décrirons d’abord les spécificités psychopathologiques de cette population, en nous référant aux travaux de J. Piaget et de D. Kiesler. À partir de ces théories, nous mettrons en avant le modèle Cognitive Behavioral Analysis System of Psychotherapy (CBASP), selon McCullough. Cet auteur propose deux volets d’interventions spécifiquement adaptées aux patients avec dépression chronique : l’analyse situationnelle et les techniques interpersonnelles basées sur la notion de transfert et de contre-transfert. Nous soulignerons la pertinence de cette approche par le résumé de plusieurs études empiriques ayant établi l’efficacité de ce modèle, sous certaines conditions cliniques. Nous terminerons par une réflexion de l’application de ce modèle au-delà du tableau clinique de la dépression chronique en ajoutant ainsi des arguments supplémentaires en faveur de l’apport du modèle CBASP au champ actuel de la psychothérapie des troubles mentaux.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

De Mallarmé à la fin du xxe siècle, les œuvres d’avant-garde se situent dans un rapport tensionnel et dialectique à la presse. Jusqu’au surréalisme, la littérature emprunte son modèle à la presse, mais en n’en sélectionnant que certaines caractéristiques, et sans oublier la logique du Livre mallarméen : est ainsi visée une synthèse du livre et du journal, dont Le surréalisme au service de la Révolution constitue l’exemple le plus achevé. Si les œuvres d’assemblage de textes de la deuxième moitié du xxe siècle découlent plutôt du collage, elles intègrent des coupures de presse et permettent non seulement de la critiquer, mais surtout de proposer une « pluritextualité » qui fonctionne autrement que les journaux, et qui pourrait être le modèle d’une presse utopique qui demanderait au lecteur non seulement de s’informer, mais surtout de mettre en relation et en perspective les différentes informations qui lui sont proposées.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND Since the pioneering work of Jacobson and Suarez, microsurgery has steadily progressed and is now used in all surgical specialities, particularly in plastic surgery. Before performing clinical procedures it is necessary to learn the basic techniques in the laboratory. OBJECTIVE To assess an animal model, thereby circumventing the following issues: ethical rules, cost, anesthesia and training time. METHODS Between July 2012 and September 2012, 182 earthworms were used for 150 microsurgical trainings to simulate discrepancy microanastomoses. Training was undertaken over 10 weekly periods. Each training session included 15 simulations of microanastomoses performed using the Harashina technique (earthworm diameters >1.5 mm [n=5], between 1.0 mm and 1.5 mm [n=5], and <1.0 mm [n=5]). The technique is presented and documented. A linear model with main variable as the number of the week (as a numeric covariate) and the size of the animal (as a factor) was used to determine the trend in time of anastomosis over subsequent weeks as well as differences between the different size groups. RESULTS The linear model showed a significant trend (P<0.001) in time of anastomosis in the course of the training, as well as significant differences (P<0.001) between the groups of animal of different sizes. For diameter >1.5 mm, mean anastomosis time decreased from 19.6±1.9 min to 12.6±0.7 min between the first and last week of training. For training involving smaller diameters, the results showed a reduction in execution time of 36.1% (P<0.01) (diameter between 1.0 mm and 1.5 mm) and 40.6% (P<0.01) (diameter <1.0 mm) between the first and last weeks. The study demonstrates an improvement in the dexterity and speed of nodes' execution. CONCLUSION The earthworm appears to be a reliable experimental model for microsurgical training of discrepancy microanastomoses. Its numerous advantages, as discussed in the present report, show that this model of training will significantly grow and develop in the near future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La formulación de cebos para el control de hormigas cortadoras es conveniente por su mayor practicidad y economía. En el proceso de desarrollo de hormiguicidas con sustancias naturales, se probaron extractos de cítricos como atrayentes para cebos, sobre obreras de Acromyrmex lundi, en dos ensayos: en laboratorio y en campo. Con extractos de naranja dulce, pomelo rosado, mandarina y naranja amarga se impregnaron discos de papel de filtro. Se ofrecieron a las hormigas en un diseño de bloques al azar (DBA) con libre elección. En laboratorio, en hormiguero artificial, se presentaron grupos de 20 discos con los tratamientos. Se registró el número de discos remanentes y el tiempo transcurrido hasta la remoción del primer disco. En campo, el bloque correspondió a cada hormiguero y se dispusieron grupos de 10 discos en cada senda, registrándose los mismos parámetros. El extracto de mandarina resultó preferido en laboratorio según la prueba de Tukey. En campo, fue preferido el extracto de pomelo. Los extractos utilizados atrajeron a las obreras de A. lundi, podadoras en dicotiledóneas; se observó respuesta diferencial para las distintas especies pero el ordenamiento en la preferencia no fue consistente para los ensayos en condiciones artificiales y de campo.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Voltage-gated potassium (K+) channels are present in all living systems. Despite high structural similarities in the transmembrane domains (TMD), this K+ channel type segregates into at least two main functional categories—hyperpolarization-activated, inward-rectifying (Kin) and depolarization-activated, outward-rectifying (Kout) channels. Voltage-gated K+ channels sense the membrane voltage via a voltage-sensing domain that is connected to the conduction pathway of the channel. It has been shown that the voltage-sensing mechanism is the same in Kin and Kout channels, but its performance results in opposite pore conformations. It is not known how the different coupling of voltage-sensor and pore is implemented. Here, we studied sequence and structural data of voltage-gated K+ channels from animals and plants with emphasis on the property of opposite rectification. We identified structural hotspots that alone allow already the distinction between Kin and Kout channels. Among them is a loop between TMD S5 and the pore that is very short in animal Kout, longer in plant and animal Kin and the longest in plant Kout channels. In combination with further structural and phylogenetic analyses this finding suggests that outward-rectification evolved twice and independently in the animal and plant kingdom.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two different approaches were used to examine the in vivo role of polyamines in causing inward rectification of potassium channels. In two-microelectrode voltage-clamp experiments, 24-hr incubation of Xenopus oocytes injected with 50 nl of difluoromethylornithine (5 mM) and methylglyoxal bis(guanylhydrazone) (1 mM) caused an approximate doubling of expressed Kir2.1 currents and relieved rectification by causing an approximately +10-mV shift of the voltage at which currents are half-maximally inhibited. Second, a putrescine auxotrophic, ornithine decarboxylase-deficient Chinese hamster ovary (O-CHO) cell line was stably transfected with the cDNA encoding Kir2.3. Withdrawal of putrescine from the medium led to rapid (1-day) loss of the instantaneous phase of Kir2.3 channel activation, consistent with a decline of intracellular putrescine levels. Four days after putrescine withdrawal, macroscopic conductance, assessed using an 86Rb+ flux assay, was approximately doubled, and this corresponded to a +30-mV shift of V1/2 of rectification. With increasing time after putrescine withdrawal, there was an increase in the slowest phase of current activation, corresponding to an increase in the spermine-to-spermidine ratio over time. These results provide direct evidence for a role of each polyamine in induction of rectification, and they further demonstrate that in vivo modulation of rectification is possible by manipulation of polyamine levels using genetic and pharmacological approaches.