Search results for "Merging"

showing 10 items of 649 documents

Experimental Infection of Voles with Francisella tularensis Indicates Their Amplification Role in Tularemia Outbreaks

2014

Tularemia outbreaks in humans have been linked to fluctuations in rodent population density, but the mode of bacterial maintenance in nature is unclear. Here we report on an experiment to investigate the pathogenesis of Francisella tularensis infection in wild rodents, and thereby assess their potential to spread the bacterium. We infected 20 field voles (Microtus agrestis) and 12 bank voles (Myodes glareolus) with a strain of F. tularensis ssp. holarctica isolated from a human patient. Upon euthanasia or death, voles were necropsied and specimens collected for histological assessment and identification of bacteria by immunohistology and PCR. Bacterial excretion and a rapid lethal clinical …

RodentVeterinary Microbiology413 Veterinary scienceDisease Outbreakslaw.inventionPathogenesisTularemia0302 clinical medicinelawZoonosesSWEDENMedicine and Health SciencesEPIDEMIOLOGYFrancisella tularensisTularemiaPolymerase chain reactionRISK0303 health sciencesMultidisciplinaryArvicolinaeTransmission (medicine)QRInfectious DiseasesVeterinary DiseasesSURVIVALMedicineVeterinary PathologyFARMERSResearch ArticleTRANSMISSIONScienceeducation030231 tropical medicine10184 Institute of Veterinary PathologyMOSQUITOS1100 General Agricultural and Biological SciencesBiologyVeterinary EpidemiologyMicrobiology03 medical and health sciences1300 General Biochemistry Genetics and Molecular Biologybiology.animalmedicineAnimalsMicrotusHOLARCTICAta413Francisella tularensis1000 Multidisciplinary030306 microbiologyta1183Biology and Life SciencesOutbreakmedicine.diseasebiology.organism_classificationEmerging Infectious DiseasesImmunology570 Life sciences; biologyta1181Veterinary Science3111 BiomedicinePLoS ONE
researchProduct

Specific Recognition of the 5′-Untranslated Region of West Nile Virus Genome by Human Innate Immune System

2022

In the last few years, the sudden outbreak of COVID-19 caused by SARS-CoV-2 proved the crucial importance of understanding how emerging viruses work and proliferate, in order to avoid the repetition of such a dramatic sanitary situation with unprecedented social and economic costs. West Nile Virus is a mosquito-borne pathogen that can spread to humans and induce severe neurological problems. This RNA virus caused recent remarkable outbreaks, notably in Europe, highlighting the need to investigate the molecular mechanisms of its infection process in order to design and propose efficient antivirals. Here, we resort to all-atom Molecular Dynamics simulations to characterize the structure of th…

SARS-CoV-2oligoadenylate synthetase 1COVID-195′-untranslated regionWest Nile Virus; oligoadenylate synthetase 1; 5′-untranslated region; recognition mechanism; immune system; emerging virusesAntiviral Agentsemerging virusesInfectious DiseasesSettore CHIM/03 - Chimica Generale E InorganicaImmune SystemVirologyAnimalsHumansrecognition mecha-nism5' Untranslated RegionsWest Nile virusWest Nile FeverViruses
researchProduct

Empirical Study on Cyber Range Capabilities, Interactions and Learning Features

2021

Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critic…

SDG 16 - PeaceKnowledge managementCybersecurityComputer scienceEmerging technologiesEmpirical researchAcquisition of skillsHuman PerformanceLearningResilience (network)Cognitive behaviourHuman Dimensionbusiness.industrySDG 16 - Peace Justice and Strong InstitutionsCyber-physical systemSDG 8 - Decent Work and Economic Growth/dk/atira/pure/sustainabledevelopmentgoals/quality_education/dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutions/dk/atira/pure/sustainabledevelopmentgoals/decent_work_and_economic_growthJustice and Strong InstitutionsMixed realityCyber RangeVirtual learning environmentAugmented realitybusinessHuman factorsSDG 4 - Quality Education
researchProduct

Modeling Networks of Probabilistic Memristors in SPICE

2021

Efficient simulation of stochastic memristors and their networks requires novel modeling approaches. Utilizing a master equation to find occupation probabilities of network states is a recent major departure from typical memristor modeling [Chaos, solitons fractals 142, 110385 (2021)]. In the present article we show how to implement such master equations in SPICE – a general purpose circuit simulation program. In the case studies we simulate the dynamics of acdriven probabilistic binary and multi-state memristors, and dc-driven networks of probabilistic binary and multi-state memristors. Our SPICE results are in perfect agreement with known analytical solutions. Examples of LTspice code are…

SPICEComputer scienceSpiceProbabilistic logicBinary number020206 networking & telecommunications02 engineering and technologyMemristorlaw.inventionComputer Science::Hardware ArchitectureComputer Science::Emerging TechnologieslawnetworksMaster equation0202 electrical engineering electronic engineering information engineeringApplied mathematicsElectrical and Electronic EngineeringMemristorsprobabilistic computingRadioengineering
researchProduct

Deploying harmonized ITS services in the framework of EasyWay project

2012

In the last decade, the use of new technologies in the transportation domain has made possible the development of the Intelligent Transport System (ITS). However, the ITS services were deployed isolated. The purpose of the EasyWay Project is to involve all the European countries to deploy harmonized ITS services taking into account the European citizen as final In this paper, an introduction of EasyWay project is done, including the ITS concept services and the Deployment Guidelines. A deployment guideline for traffic management and corridors is presented. Using this guideline, a real Spanish Traffic management Plan is analyzed.

STREAMS Integrated Intelligent Transport SystemEngineering managementTraffic managementComputer scienceEmerging technologiesSoftware deploymentGuidelinePlan (drawing)Computer securitycomputer.software_genreIntelligent transportation systemcomputerAdvanced Traffic Management SystemProceedings of the 6th Euro American Conference on Telematics and Information Systems
researchProduct

Checkpointing Workflows for Fail-Stop Errors

2017

International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…

ScheduleComputer scienceworkflowDistributed computing[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010103 numerical & computational mathematics02 engineering and technologyParallel computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesTheoretical Computer Science[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]checkpointfail-stop error0202 electrical engineering electronic engineering information engineeringOverhead (computing)[INFO]Computer Science [cs]0101 mathematicsresilienceClass (computer programming)020203 distributed computingJob shop schedulingProbabilistic logic020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationDynamic programmingTask (computing)[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]WorkflowComputational Theory and MathematicsHardware and Architecture[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Task analysis[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Software
researchProduct

Serial In-network Processing for Large Stationary Wireless Sensor Networks

2017

International audience; In wireless sensor networks, a serial processing algorithm browses nodes one by one and can perform different tasks such as: creating a schedule among nodes, querying or gathering data from nodes, supplying nodes with data, etc. Apart from the fact thatserial algorithms totally avoid collisions, numerous recent works have confirmed that these algorithms reduce communications andconsiderably save energy and time in large-dense networks. Yet, due to the path construction complexity, the proposed algorithmsare not optimal and their performances can be further enhanced. To do so, in the present paper, we propose a new serial processing algorithm that, in most of the case…

ScheduleVisual sensor networkbusiness.industryComputer science020206 networking & telecommunications02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation020202 computer hardware & architectureSerial memory processing[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingKey distribution in wireless sensor networks[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Sensor nodeScalability0202 electrical engineering electronic engineering information engineeringMobile wireless sensor network[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

Determination of organic pollutants in Anguilla anguilla by liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS)

2021

© 2021 The Authors.

ScienceClinical BiochemistryIllicit drugs010501 environmental sciencesQuechersTandem mass spectrometry01 natural sciences03 medical and health sciencesEmerging pollutantsLiquid chromatography–mass spectrometryPFASsPlaguicidesSolid phase extractionPesticides030304 developmental biology0105 earth and related environmental sciencesPollutant0303 health sciencesChromatographyChemistryExtraction (chemistry)QQuímicaQueChERsContaminationPesticideEMR-lipidMedical Laboratory TechnologyLiverPharmaceuticalsMuscleMethodsX
researchProduct

THE SCOPE OF DUE DILIGENCE IN CROSS-BORDER ACQUISITIONS IN CENTRAL AND EASTERN EUROPE

2015

Cross-border acquisitions play an important role in the corporate strategic development and international expansion. The paper summarizes the results of the dissertation, which intends to establish vital link between research and practice, deeply exploring the risk assessment methods and the scope of due diligence audit in the pre-acquisition phase. The central hypothesis of the comprehensive model stated that thorough due diligence in the pre-acquisition phase is necessary to make successful cross-border acquisition. The empirical evidence has been drawn on data sample of acquisitions made by automotive firms in cross-border acquisitions in the Central and Eastern Europe. The main results …

Scope (project management)business.industrySupply chainMergers and acquisitionsAutomotive industryAccountingAuditbusinessEmerging marketsEmpirical evidenceDue diligenceEuropean Journal of Business and Economics
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct