Search results for "DEP"
showing 10 items of 10555 documents
Design and Calibration of a Specialized Polydioptric Camera Rig
2017
International audience; It has been observed in the nature that all creatures have evolved highly exclusive sensory organs depending on their habitat and the form of resources availability for their survival. In this project, a novel omnidirectional camera rig, inspired from natural vision sensors, is proposed. It is exclusively designed to operate for highly specified tasks in the field of mobile robotics. Navigation problems on uneven terrains and detection of the moving objects while the robot is itself in motion are the core problems that omnidirectional systems tackle. The proposed omnidirectional system is a compact and a rigid vision system with dioptric cameras that provide a 360° f…
New delay-dependent stability of Markovian jump neutral stochastic systems with general unknown transition rates
2015
This paper investigates the delay-dependent stability problem for neutral Markovian jump systems with generally unknown transition rates GUTRs. In this neutral GUTR model, each transition rate is completely unknown or only its estimate value is known. Based on the study of expectations of the stochastic cross-terms containing the integral, a new stability criterion is derived in terms of linear matrix inequalities. In the mathematical derivation process, bounding stochastic cross-terms, model transformation and free-weighting matrix are not employed for less conservatism. Finally, an example is provided to demonstrate the effectiveness of the proposed results.
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Analyzing Cascading Effects in Interdependent Critical Infrastructures
2018
International audience; Critical Infrastructures (CIs) are resources that are essential for the performance of society, including its economy and its security. Large-scale disasters, whether natural or man-made, can have devastating primary (direct) effects on some CI and significant indirect effects (cascading effects) on other CIs, because CIs are interconnected and depend on each other’s services. Recent work by Laugé et al. expressed the dependency values among CIs as dependency matrices for various durations of the primary CI failure. For better preparedness and mitigation of CI failures knowledge of the weak points in CI interdependencies is crucial. To this effect, we have developed …
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…
The Relationship between Self-Esteem, Depression and Anxiety: Comparing Vulnerability and Scar Model in the Italian Context
2016
Abstract Background: The relationship between low self-esteem and depression and anxiety disorders has solicited a growing body of empirical research. The most important explanation models are two: the vulnerability model states that low self-esteem is a risk factor for depression and anxiety, and the scar model states that low self-esteem is an outcome, not a cause, of depression and anxiety. Method: In the present research we tested the two different models using a sample of Italian preadolescent, aged 11 to 14 years, recruited from an Italian secondary school. To test the models, the path analysis technique was used: one in which self-esteem predicted anxiety and depression (Model 1), an…
Efectos de un programa de eliminación de sujeciones físicas sobre personas mayores con demencia en residencias
2016
Resumen Objetivo Analizar los resultados de eliminar las sujeciones fisicas en mayores con demencia que viven en residencias. Este objetivo se enmarca en un proceso mas amplio de modificacion del modelo de atencion residencial. Metodo Estudio cuasi experimental en dos residencias desde mayo de 2010 hasta mayo de 2012. Se recoge informacion en 7 momentos temporales y se efectua un analisis longitudinal. Tras formar al personal se retiraron progresivamente las sujeciones fisicas en el centro El Puig, mientras que en el centro Conarda se mantuvieron las sujeciones. Las variables principales medidas fueron: caidas, psicofarmacos administrados, asi como diversos indicadores de estado mental y fu…
NMR Investigation of Structures of G-Protein Coupled Receptor Folding Intermediates
2016
Folding of G-protein coupled receptors (GPCRs) according to the two-stage model (Popot, J. L., and Engelman, D. M. (1990) Biochemistry 29, 4031-4037) is postulated to proceed in 2 steps: partitioning of the polypeptide into the membrane followed by diffusion until native contacts are formed. Herein we investigate conformational preferences of fragments of the yeast Ste2p receptor using NMR. Constructs comprising the first, the first two, and the first three transmembrane (TM) segments, as well as a construct comprising TM1-TM2 covalently linked to TM7 were examined. We observed that the isolated TM1 does not form a stable helix nor does it integrate well into the micelle. TM1 is significant…
Eawag-Soil in enviPath: a new resource for exploring regulatory pesticide soil biodegradation pathways and half-life data.
2017
Developing models for the prediction of microbial biotransformation pathways and half-lives of trace organic contaminants in different environments requires as training data easily accessible and sufficiently large collections of respective biotransformation data that are annotated with metadata on study conditions. Here, we present the Eawag-Soil package, a public database that has been developed to contain all freely accessible regulatory data on pesticide degradation in laboratory soil simulation studies for pesticides registered in the EU (282 degradation pathways, 1535 reactions, 1619 compounds and 4716 biotransformation half-life values with corresponding metadata on study conditions)…
Engineering of a DNA Polymerase for Direct m6A Sequencing
2017
Methods for the detection of RNA modifications are of fundamental importance for advancing epitranscriptomics. N6-methyladenosine (m6A) is the most abundant RNA modification in mammalian mRNA and is involved in the regulation of gene expression. Current detection techniques are laborious and rely on antibody-based enrichment of m6A-containing RNA prior to sequencing, since m6A modifications are generally "erased" during reverse transcription (RT). To overcome the drawbacks associated with indirect detection, we aimed to generate novel DNA polymerase variants for direct m6A sequencing. Therefore, we developed a screen to evolve an RT-active KlenTaq DNA polymerase variant that sets a mark for…