1000 resultados para MUSEOLOGICAL COMMUNICATION
Resumo:
This document produced by the Iowa Department of Administrative Services has been developed to provide a multitude of information about executive branch agencies/department on a single sheet of paper. The facts provides general information, contact information, workforce data, leave and benefits information and affirmative action data.
Resumo:
SUMMARY Inflammation has evolved as a mechanism to defend the body against invading microorganisms and to respond to injury. It requires the coordinated response of a large number of cell types from the whole organism in a time- and space-dependent fashion. This coordination involves several cell-cell communication mechanisms. Exchange of humoral mediators such as cytokines is a major one. Moreover, direct contact between cells happens and plays a primordial role, for example when macrophages present antigens to lymphocytes. Contact between endothelial cells and leucocytes occurs when the latter cross the blood vessel barrier and transmigrate to the inflammatory site. A particular way by which cells communicate with each other in the course of inflammation, which at this time starts to gain attention, is the intercellular communication mediated by gap junctions. Gap junctions are channels providing a direct pathway (i.e. without transit through the extracellular space) for the diffusion of small molecules between adjacent cells. This process is known as gap junctional intercellular communication (GJIC). The general aim of this thesis was to study a possible involvement of GJIC in the pathophysiology of inflammation. A first part of the work was dedicated to study the implication of GJIC in the modification of vascular endothelial function by inflammation. In a second part, we were interested in the possible role of GJIC in the transmigration of neutrophil polymorphonuclear leucocytes through the endothelium. The main positive finding of this work is that acute inflammation preferentially modulates the expression of connexin 40 (Cx40), a gap junction protein specifically expressed in vascular endothelium. The modulation could be towards overexpression (aortic endothelium of septic rats) or towards downregulation (acutely inflamed mouse lung). We put a lot of efforts in search of possible functions of these modulations, in two directions: a potential protective role of Cx40 increased expression against sepsis-induced endothelial dysfunction, and a facilitating role of Cx40 decreased expression in neutrophil transmigration. To pursue both directions, it seemed logical to study the impact of Cx40 deletion using knock-out mice. Concerning the potential protective role of Cx40 overexpression we encountered a roadblock as we observed, in the aorta, a Cx40 downregulation in wild type mouse whereas Cx40 was upregulated in the rat. Regarding the second direction and using an in vivo approach, we observed that pulmonary neutrophil transmigration was not affected by the genetic deletion of Cx40. In spite of their negative nature, these results are the very first ones regarding the potential implication of GJIC concerning leucocyte transmigration in vivo. Because this process involves such tight cell-cell physical contacts, the hypothesis for a role of GJIC remains attractive.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
This document produced by the Iowa Department of Administrative Services has been developed to provide a multitude of information about executive branch agencies/department on a single sheet of paper. The facts provides general information, contact information, workforce data, leave and benefits information and affirmative action data.
Resumo:
This brochure explains Iowa's laws concerning the use of cell phones and other electronic communication devices while driving.
Resumo:
We present a simple model of communication in networks with hierarchical branching. We analyze the behavior of the model from the viewpoint of critical systems under different situations. For certain values of the parameters, a continuous phase transition between a sparse and a congested regime is observed and accurately described by an order parameter and the power spectra. At the critical point the behavior of the model is totally independent of the number of hierarchical levels. Also scaling properties are observed when the size of the system varies. The presence of noise in the communication is shown to break the transition. The analytical results are a useful guide to forecasting the main features of real networks.
Resumo:
Constatant que la formation des enseignants aux technologies de l'information et de la communication (TIC) pose des problèmes spécifiques, cet article a pour but d'engager une réflexion sur ce thème. Nos réflexions s'appuient sur une expérience de formation réalisée dans 23 écoles professionnelles suisses engagées dans un programme national de soutien à l'utilisation pédagogique des TIC. L'article décrit la manière dont le dispositif de formation prévu a été mis en pratique, les difficultés auxquelles il a donné lieu et les réponses que les acteurs ont élaborées pour faire face à ces difficultés. Nous montrons qu'une analyse du déroulement effectif d'un dispositif de formation et des transformations qu'il subit constitue un élément essentiel pour orienter les futures actions de formation et penser la place des apprenants dans un dispositif de formation.
Resumo:
Donateur : Nathan, Fernand (1858-1947)