918 resultados para cognitive dimension
Resumo:
HIV escape in the central nervous system (CNS) despite undetectable viral load in the plasma has been observed and may contribute to HIV-associated neurocognitive disorders. Favouring the use of HIV drugs with a good penetration into the CNS has been advocated, leading to the establishment of the CNS penetration-effectiveness (CPE) score. However, the relevance of this score is not fully established. Ciccarelli et al. compared two versions of the CPE scores in their capacity to predict cognitive dysfunction in HIV-infected individuals. The revised CPE score, but not the original one, showed an improved association with cognitive impairment. Prospective studies are warranted to assess the validity of the CPE score.
Resumo:
Cette thèse explore le rôle de la normalisation technique dans les délocalisations de services en Inde et au Maroc. La recherche appréhende le phénomène en opposant explicitement ou implicitement deux modèles. Un modèle serviciel dans lequel les activités de services sont difficilement délocalisables parce que non-mesurables ; un modèle industriel qui articule des activités de services mesurables par les normes techniques et susceptibles d'être délocalisés dans les pays du Sud à bas salaires. Notre thèse s'interroge sur la manière dont les relations Nord-Sud peuvent s'appréhender au sein de cette dichotomie et propose une réflexion épistémologique sur les représentations culturelles induites au sein de ce cadrage. A partir d'une perspective qui combine les apports de l'économie politique culturelle, la sociologie économique et les études postcoloniales au sein de l'économie politique internationale, elle mobilise trois catégories (la normalisation technique, l'imaginaire économique, la qualité). Ces catégories nous permettent de suggérer la centralité des enjeux de pouvoirs dans la définition de ce que sont les activités de services. L'analyse empirique suggère que les délocalisations de services au Maroc et en Inde expriment des réalités plus poreuses et plus dynamiques que la dichotomie entre modèle serviciel et modèle industriel laisse entendre. Elle met en évidence la capacité d'agir des acteurs des pays du Sud et suggère que les normes techniques ont une fonction politique à travers leurs fonctions de mesure. Abstract This thesis explores the role of technical standards in offshore outsourcing in India and Morocco. Current research captures the phenomenon while opposing explicitly or implicitly two models of production. A service-based model in which service activities are difficult to relocate because they are non-measurable; an industrial model that articulates service activities measured with technical standards and that may be outsourced to developing countries with low wages. Our thesis questions how North-South relations can be grasped within this dichotomy and offers an epistemologica! reflection on cultural representations induced within this framework. From a perspective that combines the contributions of cultural political economy, economic sociology and postcolonial studies in international political economy, it mobilizes three categories (technical standardization, the economic imaginary and quality). These categories allow us to suggest the centrality of power issues in the definition of service activities. The empirical analysis suggests that offshoring of services in Morocco and India express more porous and dynamic realities than the dichotomy suggested between a service model and an industrial model. It highlights the ability of the actors to act in the South and suggests that technical standards have a political function through their measurement functions.
Resumo:
Electroencephalography (EEG) is an easily accessible and low-cost modality that might prove to be a particularly powerful tool for the identification of subtle functional changes preceding structural or metabolic deficits in progressive mild cognitive impairment (PMCI). Most previous contributions in this field assessed quantitative EEG differences between healthy controls, MCI and Alzheimer's disease(AD) cases leading to contradictory data. In terms of MCI conversion to AD, certain longitudinal studies proposed various quantitative EEG parameters for an a priori distinction between PMCI and stable MCI. However, cross-sectional comparisons revealed a substantial overlap in these parameters between MCI patients and elderly controls. Methodological differences including variable clinical definition of MCI cases and substantial interindividual differences within the MCI group could partly explain these discrepancies. Most importantly, EEG measurements without cognitive demand in both cross-sectional and longitudinal designs have demonstrated limited sensitivity and generally do not produce significant group differences in spectral EEG parameters. Since the evolution of AD is characterized by the progressive loss of functional connectivity within neocortical association areas, event-modulated EEG dynamic analysis which makes it possible to investigate the functional activation of neocortical circuits may represent a more sensitive method to identify early alterations of neuronal networks predictive of AD development among MCI cases. The present review summarizes clinically significant results of EEG activation studies in this field and discusses future perspectives of research aiming to reach an early and individual prediction of cognitive decline in healthy elderly controls.
Resumo:
Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.
Resumo:
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.
Resumo:
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.
Resumo:
Spectrum scarcity demands thinking new ways tomanage the distribution of radio frequency bands so that its use is more effective. The emerging technology that can enable this paradigm shift is the cognitive radio. Different models fororganizing and managing cognitive radios have emerged, all with specific strategic purposes. In this article we review the allocation spectrum patterns of cognitive radio networks andanalyse which are the common basis of each model.We expose the vulnerabilities and open challenges that still threaten the adoptionand exploitation of cognitive radios for open civil networks.
Resumo:
Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.
Resumo:
abstract:occasional Adnominal Idiom Modification - A Cognitive Linguistic Approach From a cognitive-linguistic perspective, this paper explores alternative types of adnoniinal modification in occasional variants of English verbal idioms. Being discussed against data extracted from the British National Corpiis (BNC), the model claims that in idioni-production idiomatic constructions are activated as complex linguistic schemas to code a context-specific target-conceptualisation. Adnominal pre- and postmodifications are one specific form of creative alteration to adapt the idiom for this purpose. Semantically, idiom-interna1 NPextension is not a uniforni process. It is necessary to distinguish two systematic types of adnominal modification: external and internal modification (Ernst 1981). While external NPmodification has adverbial function, ¡.e. it modifies the idiom as a unit, internal modification directly applies to the head-noun and thus depends on the degree of motivation and analysability of a given idiom. Following the cognitive-linguistic framework, these dimensions of idiom-transparency result from the language user's ability to remotivate the bipartite semantic structure by conceptual metaphors and metonymies.
Resumo:
Comentaris referits a l'article següent: K. J. Vinoy, J. K. Abraham, and V. K. Varadan, “On the relationshipbetween fractal dimension and the performance of multi-resonant dipoleantennas using Koch curves,” IEEE Transactions on Antennas and Propagation, 2003, vol. 51, p. 2296–2303.