982 resultados para Key cutting algorithm
Resumo:
Abstract The solvability of the problem of fair exchange in a synchronous system subject to Byzantine failures is investigated in this work. The fair exchange problem arises when a group of processes are required to exchange digital items in a fair manner, which means that either each process obtains the item it was expecting or no process obtains any information on, the inputs of others. After introducing a novel specification of fair exchange that clearly separates safety and liveness, we give an overview of the difficulty of solving such a problem in the context of a fully-connected topology. On one hand, we show that no solution to fair exchange exists in the absence of an identified process that every process can trust a priori; on the other, a well-known solution to fair exchange relying on a trusted third party is recalled. These two results lead us to complete our system model with a flexible representation of the notion of trust. We then show that fair exchange is solvable if and only if a connectivity condition, named the reachable majority condition, is satisfied. The necessity of the condition is proven by an impossibility result and its sufficiency by presenting a general solution to fair exchange relying on a set of trusted processes. The focus is then turned towards a specific network topology in order to provide a fully decentralized, yet realistic, solution to fair exchange. The general solution mentioned above is optimized by reducing the computational load assumed by trusted processes as far as possible. Accordingly, our fair exchange protocol relies on trusted tamperproof modules that have limited communication abilities and are only required in key steps of the algorithm. This modular solution is then implemented in the context of a pedagogical application developed for illustrating and apprehending the complexity of fair exchange. This application, which also includes the implementation of a wide range of Byzantine behaviors, allows executions of the algorithm to be set up and monitored through a graphical display. Surprisingly, some of our results on fair exchange seem contradictory with those found in the literature of secure multiparty computation, a problem from the field of modern cryptography, although the two problems have much in common. Both problems are closely related to the notion of trusted third party, but their approaches and descriptions differ greatly. By introducing a common specification framework, a comparison is proposed in order to clarify their differences and the possible origins of the confusion between them. This leads us to introduce the problem of generalized fair computation, a generalization of fair exchange. Finally, a solution to this new problem is given by generalizing our modular solution to fair exchange
Resumo:
Adaptació de l'algorisme de Kumar per resoldre sistemes d'equacions amb matrius de Toeplitz sobre els reals a cossos finits en un temps 0 (n log n).
Resumo:
La principal motivació d'aquest treball ha estat implementar l'algoritme Rijndael-AES en un full Sage-math, paquet de software matemàtic de lliure distribució i en actual desenvolupament, aprofitant les seves eines i funcionalitats integrades.
Resumo:
Résumé : Ce travail comprend deux parties : La première partie a pour but de présenter une revue des techniques de gastrostomie chez l'enfant. La gastrostomie est, par définition, un tractus fistuleux entre l'estomac et la paroi abdominale. Le but de la gastrostomie est de permettre la décompression gastrique, la nutrition entérale et l'apport médicamenteux. Les indications et contre-indications à la confection et utilisation de la gastrostomie sont détaillées dans ce travail. Historiquement, les premières gastrostomies étaient d'origine accidentelle ou infectieuse (fistule gastro-cutanée), incompatibles avec la vie. Sedillot, en 1845 décrivit la première gastrostomie chirurgicale sans cathéter, qui avait comme désavantage la présence de fuites. Depuis, les techniques se sont multipliées en évoluant vers la continence et l'utilisation de cathéters. En 1979 Gauderer décrivit pour la première fois une technique percutanée, réalisée sur un enfant âgé de 5 mois. Cette technique est appelée « Percutaneous Endoscopic Gastrostomy » (PEG). Elle a ensuite été élargie à la population adulte. Actuellement, il existe une grande multiplicité de techniques par abord « laparotomique », laparoscopique ou percutanée (endoscopique ou radiologique). Ces techniques peuvent être combinées. Toutes ces techniques nécessitent la présence intermittente ou continue d'un dispositif, qui permet le maintient de la gastrostomie ouverte et évite les fuites gastriques. Ces dispositifs sont multiples; initialement il s'agissait de cathéters rigides (bois, métal, caoutchouc). Ensuite ils ont été fabriqués en silicone, ce qui les rend plus souples et mieux tolérés par le patient. Pour éviter leur dislocation, ils possèdent un système d'amarrage intra-gastrique tel que : un champignon (Bard®), un ballonnet (Foley®, Mic-Key®), ou une forme spiralée du cathéter (« pig-tail ») et possèdent un système d'amarrage extra-gastrique (« cross-bar »). En 1982, Gauderer créa le premier dispositif à fleur de peau : le bouton de gastrostomie (BG). Actuellement, il en existe deux types : à champignon (Bard®) et à ballonnet (Mic-Key®). Il existe plusieurs types de complications liées à la technique opératoire, à la prise en charge et au matériel utilisé. Une comparaison des différentes techniques, matériaux utilisés et coûts engendrés est détaillée dans ce travail. La deuxième partie de ce travail est dédiée aux BG et plus spécifiquement au BG à ballonnet (Mic-Key®). Nous présentons les différents boutons et les techniques spécifiques. Le BG est inséré soit dans une gastrostomie préformée, soit directement lors de la confection d'une gastrostomie par laparotomie, laparoscopie ou de façon percutanée. Les complications liées au BG sont rapportées. D'autres utilisations digestives ou urologiques sont décrites. Nous présentons ensuite notre expérience avec 513 BG à ballonnet (Mic-Key®) dans une revue de 73 enfants. La pose du BG est effectuée dans une gastrostomie préformée sans recours à une anesthésie générale. La technique choisie pour la confection de la gastrostomie dépend de la pathologie de base, de l'état général du patient, de la nécessité d'une opération concomitante et du risque anesthésique. Nous apportons des précisions sur le BG telles que la dimension en fonction de l'âge, la durée de vie, et les causes qui ont amené au changement du BG. Nos résultats sont comparés à ceux de la littérature. Sur la base de notre expérience et après avoir passé en revue la littérature spécialisée, nous proposons des recommandations sur le choix de la technique et le choix du matériel. Ce travail se termine avec une réflexion sur le devenir de la gastrostomie. Si le futur consiste à améliorer et innover les techniques et les matériaux, des protocoles destinés à la standardisation des techniques, à la sélection des patients et à l'enseignement des soins devraient s'en suivre. La prise en charge de l'enfant ne se limite pas à la sélection appropriée de la technique et des matériaux, mais il s'agit avant tout d'une approche multidisciplinaire. La collaboration entre le personnel soignant, la famille et l'enfant est essentielle pour que la prise en charge soit optimale et sans risques.
Resumo:
The parameter setting of a differential evolution algorithm must meet several requirements: efficiency, effectiveness, and reliability. Problems vary. The solution of a particular problem can be represented in different ways. An algorithm most efficient in dealing with a particular representation may be less efficient in dealing with other representations. The development of differential evolution-based methods contributes substantially to research on evolutionary computing and global optimization in general. The objective of this study is to investigatethe differential evolution algorithm, the intelligent adjustment of its controlparameters, and its application. In the thesis, the differential evolution algorithm is first examined using different parameter settings and test functions. Fuzzy control is then employed to make control parameters adaptive based on an optimization process and expert knowledge. The developed algorithms are applied to training radial basis function networks for function approximation with possible variables including centers, widths, and weights of basis functions and both having control parameters kept fixed and adjusted by fuzzy controller. After the influence of control variables on the performance of the differential evolution algorithm was explored, an adaptive version of the differential evolution algorithm was developed and the differential evolution-based radial basis function network training approaches were proposed. Experimental results showed that the performance of the differential evolution algorithm is sensitive to parameter setting, and the best setting was found to be problem dependent. The fuzzy adaptive differential evolution algorithm releases the user load of parameter setting and performs better than those using all fixedparameters. Differential evolution-based approaches are effective for training Gaussian radial basis function networks.
Resumo:
Poly (ADP-ribose) polymerase 1 (PARP-1) is a constitutive enzyme, the major isoform of the PARP family, which is involved in the regulation of DNA repair, cell death, metabolism, and inflammatory responses. Pharmacological inhibitors of PARP provide significant therapeutic benefits in various preclinical disease models associated with tissue injury and inflammation. However, our understanding the role of PARP activation in the pathophysiology of liver inflammation and fibrosis is limited. In this study we investigated the role of PARP-1 in liver inflammation and fibrosis using acute and chronic models of carbon tetrachloride (CCl4 )-induced liver injury and fibrosis, a model of bile duct ligation (BDL)-induced hepatic fibrosis in vivo, and isolated liver-derived cells ex vivo. Pharmacological inhibition of PARP with structurally distinct inhibitors or genetic deletion of PARP-1 markedly attenuated CCl4 -induced hepatocyte death, inflammation, and fibrosis. Interestingly, the chronic CCl4 -induced liver injury was also characterized by mitochondrial dysfunction and dysregulation of numerous genes involved in metabolism. Most of these pathological changes were attenuated by PARP inhibitors. PARP inhibition not only prevented CCl4 -induced chronic liver inflammation and fibrosis, but was also able to reverse these pathological processes. PARP inhibitors also attenuated the development of BDL-induced hepatic fibrosis in mice. In liver biopsies of subjects with alcoholic or hepatitis B-induced cirrhosis, increased nitrative stress and PARP activation was noted. CONCLUSION: The reactive oxygen/nitrogen species-PARP pathway plays a pathogenetic role in the development of liver inflammation, metabolism, and fibrosis. PARP inhibitors are currently in clinical trials for oncological indications, and the current results indicate that liver inflammation and liver fibrosis may be additional clinical indications where PARP inhibition may be of translational potential.
Resumo:
The major task of policy makers and practitioners when confronted with a resource management problem is to decide on the potential solution(s) to adopt from a range of available options. However, this process is unlikely to be successful and cost effective without access to an independently verified and comprehensive available list of options. There is currently burgeoning interest in ecosystem services and quantitative assessments of their importance and value. Recognition of the value of ecosystem services to human well-being represents an increasingly important argument for protecting and restoring the natural environment, alongside the moral and ethical justifications for conservation. As well as understanding the benefits of ecosystem services, it is also important to synthesize the practical interventions that are capable of maintaining and/or enhancing these services. Apart from pest regulation, pollination, and global climate regulation, this type of exercise has attracted relatively little attention. Through a systematic consultation exercise, we identify a candidate list of 296 possible interventions across the main regulating services of air quality regulation, climate regulation, water flow regulation, erosion regulation, water purification and waste treatment, disease regulation, pest regulation, pollination and natural hazard regulation. The range of interventions differs greatly between habitats and services depending upon the ease of manipulation and the level of research intensity. Some interventions have the potential to deliver benefits across a range of regulating services, especially those that reduce soil loss and maintain forest cover. Synthesis and applications: Solution scanning is important for questioning existing knowledge and identifying the range of options available to researchers and practitioners, as well as serving as the necessary basis for assessing cost effectiveness and guiding implementation strategies. We recommend that it become a routine part of decision making in all environmental policy areas.
Resumo:
BACKGROUND: The impact of the Integrated Management of Childhood Illness (IMCI) strategy has been less than anticipated because of poor uptake. Electronic algorithms have the potential to improve quality of health care in children. However, feasibility studies about the use of electronic protocols on mobile devices over time are limited. This study investigated constraining as well as facilitating factors that influence the uptake of a new electronic Algorithm for Management of Childhood Illness (ALMANACH) among primary health workers in Dar es Salaam, Tanzania. METHODS: A qualitative approach was applied using in-depth interviews and focus group discussions with altogether 40 primary health care workers from 6 public primary health facilities in the three municipalities of Dar es Salaam, Tanzania. Health worker's perceptions related to factors facilitating or constraining the uptake of the electronic ALMANACH were identified. RESULTS: In general, the ALMANACH was assessed positively. The majority of the respondents felt comfortable to use the devices and stated that patient's trust was not affected. Most health workers said that the ALMANACH simplified their work, reduced antibiotic prescription and gave correct classification and treatment for common causes of childhood illnesses. Few HWs reported technical challenges using the devices and complained about having had difficulties in typing. Majority of the respondents stated that the devices increased the consultation duration compared to routine practice. In addition, health system barriers such as lack of staff, lack of medicine and lack of financial motivation were identified as key reasons for the low uptake of the devices. CONCLUSIONS: The ALMANACH built on electronic devices was perceived to be a powerful and useful tool. However, health system challenges influenced the uptake of the devices in the selected health facilities.
Resumo:
Key management has a fundamental role in secure communications. Designing and testing of key management protocols is tricky. These protocols must work flawlessly despite of any abuse. The main objective of this work was to design and implement a tool that helps to specify the protocol and makes it possible to test the protocol while it is still under development. This tool generates compile-ready java code from a key management protocol model. A modelling method for these protocols, which uses Unified Modeling Language (UML) was also developed. The protocol is modelled, exported as an XMI and read by the code generator tool. The code generator generates java code that is immediately executable with a test software after compilation.
Resumo:
Tutkimuksen tarkoituksena oli tunnistaa nykyiset sekä potentiaaliset avainasiakkaat case yritykselle. Avainasiakkaat tunnistettiin Chevertonin tunnistamis- ja valintamatriisin avulla, jossa asiakkaan sijoittumista matriisiin arvioidaan asiakkaan houkuttelevuuden sekä toimittajan suhteellisten vahvuuksien avulla. Kriteereiksi avainasiakkaiden tunnistamiseen valittiin asiakkaan vuotuinen ostovolyymi, asiakkaan business-potentiaali sekä case-yrityksen toimittajaosuus. Asiakkaat luokiteltiin avainasiakkaisiin, kehitettäviin avainasiakkaisiin, ylläpidettäviin asiakkaisiin sekä satunnaisiin asiakkaisiin. Tutkimus tarjosi lähtökohdan case-yrityksen uusille avainasiakaspäälliköille sekä osoitti suunnan tulevaisuuden tutkimustarpeille. Aktiivisen tiedonvaihdannan kautta eri myyntikonttoreiden johtohenkilöstön sekä myös yrityksen eri funktionaalisten divisioonien välillä voidaan saavuttaa kilpailuetua kun lähestytään asiakasta toimintojaan järkiperäisesti koordinoineena toimittajana samalla kun asiakkaat keskittävät ostojaan. Jotta yrityksen tavoitteet, markkinamahdollisuudet sekä resurssit olisivat hyvin tasapainossa, tulisi myös asiakaskannattavuutta sekä asiakkaiden strategista merkittävyyttä arvioida ja mitata säännöllisesti tässä tutkimuksessa käytettyjen tunnistuskriteereiden lisäksi.
Resumo:
Angiogenesis is a tightly regulated process in vertebrates that leads to the formation of new blood vessels from pre-existing vessels or by the recruitment of bone marrow-derived endothelial precursor cells[1]. During embryogenesis, after stimulation by proangiogenic factors, such as VEGF or FGF, it contributes to the maturation of the vascular plexus. In adults, it is important in some physiologic conditions, such as wound healing or the reproductive cycle in females, although most of the time it is"switched off" by endogenous inhibitors, such as endostatin or angiostatin. Furthermore, its misregulation is the cause of many pathological situations, as it contributes to tumor development[2], diabetic retinopathy[3], rheumatoid arthritis[4], psoriasis[5], but also cardiovascular disorders[6] and obesity[7]
Resumo:
PURPOSE: The purpose of this study was to reach an international consensus to determine what key elements should be part of a transition program and what indicators could be used to assess its success. METHODS: For this purpose, a Delphi study including an international panel of 37 experts was carried out. The study consisted of three rounds, with response rates ranging from 86.5% to 95%. At each round, experts were asked to assess key elements (defined as the most important elements for the task) and indicators (defined as quantifiable characteristics). At each round, panelists were contacted via e-mail explaining them the tasks to be done and giving them the Web link where to complete the questionnaire. At Round 3, each key element and indicator was assessed as essential, very important, important, accessory, or unnecessary. A 70% agreement was used as cutoff. RESULTS: At Round 3, more than 70% of panelists agreed on six key elements being essential, with one of them (Assuring a good coordination between pediatric and adult professionals) reaching an almost complete consensus (97%). Additionally, 11 more obtained more than 70% agreement when combined with the Very important category. Among indicators, only one (Patient not lost to follow-up) was considered almost unanimously (91%) as essential by the panelists and seven others also reached consensus when the Very important category was included. CONCLUSIONS: Using these results as a framework to develop guidelines at local, national, and international levels would allow better assessing and comparing transition programs.
Resumo:
Tutkimusongelmana oli kuinka tiedon johtamisella voidaan edesauttaa tuotekehitysprosessia. Mitkä ovat ne avaintekijät tietoympäristössä kuin myös itse tiedossa, joilla on merkitystä erityisesti tuotekehitysprosessin arvon muodostumiseen ja prosessien kehittämiseen? Tutkimus on laadullinen Case-tutkimus. Tutkimusongelmat on ensin selvitetty kirjallisuuden avulla, jonka jälkeen teoreettinen viitekehys on rakennettu tutkimaan rajattua ongelma-aluetta case-yrityksestä. Empiirisen tutkimuksen materiaali koostuu pääasiallisesti henkilökohtaisten teemahaastattelujen aineistosta. Tulokset merkittävimmistä tiedon hyväksikäytön haittatekijöistä, kuten myös parannusehdotukset on lajiteltu teoreettisessa viitekehyksessä esitettyjen oletustekijöiden mukaan. Haastatteluissa saadut vastaukset tukevat kirjallisuudesta ja alan ammattilaiselta saatua käsitystä tärkeimmistä vaikuttavista tekijöistä. Tärkeimmät toimenpiteet ja aloitteet joilla parannettaisiin tiedon muodostumista, koskivat ennnen kaikkea työnteon ulkoisia olosuhteita, eikä niinkään tiedon muodostumisen prosessia itseään. Merkittävimpiä haittatekijöitä olivat kultturiin, fyysiseen ja henkiseen tilaan ja henkilöstöresursseihin liittyvät ongelmat. Ratkaisuja ongelmiin odotettiin saatavan lähinnä tietotekniikan, henkilöstöresurssien ja itse tiedon muokkaamisen avulla. Tuotekehitysprosessin ydin tietovirtojen ja –pääomien luokittelu ja tulkitseminen tiedon muodostusta kuvaavan Learning Spiralin avulla antoi lähinnä teoreettisia viitteitä siitä millaisia keinoja on olemassa tiedon lisäämiseen ja jakamiseen eri tietotyypeittäin. Tulosten perusteella caseyrityksessä pitäisi kiinnittää erityistä huomiota tiedon dokumentointiin ja jakamiseen erityisesti sen tiedon osalta, joka on organisaatiossa vain harvalla ja/tai luonteeltaan hyvin tacitia.
Resumo:
A Wiener system is a linear time-invariant filter, followed by an invertible nonlinear distortion. Assuming that the input signal is an independent and identically distributed (iid) sequence, we propose an algorithm for estimating the input signal only by observing the output of the Wiener system. The algorithm is based on minimizing the mutual information of the output samples, by means of a steepest descent gradient approach.