Search results for "Merging"
showing 10 items of 649 documents
Experimental Infection of Voles with Francisella tularensis Indicates Their Amplification Role in Tularemia Outbreaks
2014
Tularemia outbreaks in humans have been linked to fluctuations in rodent population density, but the mode of bacterial maintenance in nature is unclear. Here we report on an experiment to investigate the pathogenesis of Francisella tularensis infection in wild rodents, and thereby assess their potential to spread the bacterium. We infected 20 field voles (Microtus agrestis) and 12 bank voles (Myodes glareolus) with a strain of F. tularensis ssp. holarctica isolated from a human patient. Upon euthanasia or death, voles were necropsied and specimens collected for histological assessment and identification of bacteria by immunohistology and PCR. Bacterial excretion and a rapid lethal clinical …
Specific Recognition of the 5′-Untranslated Region of West Nile Virus Genome by Human Innate Immune System
2022
In the last few years, the sudden outbreak of COVID-19 caused by SARS-CoV-2 proved the crucial importance of understanding how emerging viruses work and proliferate, in order to avoid the repetition of such a dramatic sanitary situation with unprecedented social and economic costs. West Nile Virus is a mosquito-borne pathogen that can spread to humans and induce severe neurological problems. This RNA virus caused recent remarkable outbreaks, notably in Europe, highlighting the need to investigate the molecular mechanisms of its infection process in order to design and propose efficient antivirals. Here, we resort to all-atom Molecular Dynamics simulations to characterize the structure of th…
Empirical Study on Cyber Range Capabilities, Interactions and Learning Features
2021
Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critic…
Modeling Networks of Probabilistic Memristors in SPICE
2021
Efficient simulation of stochastic memristors and their networks requires novel modeling approaches. Utilizing a master equation to find occupation probabilities of network states is a recent major departure from typical memristor modeling [Chaos, solitons fractals 142, 110385 (2021)]. In the present article we show how to implement such master equations in SPICE – a general purpose circuit simulation program. In the case studies we simulate the dynamics of acdriven probabilistic binary and multi-state memristors, and dc-driven networks of probabilistic binary and multi-state memristors. Our SPICE results are in perfect agreement with known analytical solutions. Examples of LTspice code are…
Deploying harmonized ITS services in the framework of EasyWay project
2012
In the last decade, the use of new technologies in the transportation domain has made possible the development of the Intelligent Transport System (ITS). However, the ITS services were deployed isolated. The purpose of the EasyWay Project is to involve all the European countries to deploy harmonized ITS services taking into account the European citizen as final In this paper, an introduction of EasyWay project is done, including the ITS concept services and the Deployment Guidelines. A deployment guideline for traffic management and corridors is presented. Using this guideline, a real Spanish Traffic management Plan is analyzed.
Checkpointing Workflows for Fail-Stop Errors
2017
International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…
Serial In-network Processing for Large Stationary Wireless Sensor Networks
2017
International audience; In wireless sensor networks, a serial processing algorithm browses nodes one by one and can perform different tasks such as: creating a schedule among nodes, querying or gathering data from nodes, supplying nodes with data, etc. Apart from the fact thatserial algorithms totally avoid collisions, numerous recent works have confirmed that these algorithms reduce communications andconsiderably save energy and time in large-dense networks. Yet, due to the path construction complexity, the proposed algorithmsare not optimal and their performances can be further enhanced. To do so, in the present paper, we propose a new serial processing algorithm that, in most of the case…
Determination of organic pollutants in Anguilla anguilla by liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS)
2021
© 2021 The Authors.
THE SCOPE OF DUE DILIGENCE IN CROSS-BORDER ACQUISITIONS IN CENTRAL AND EASTERN EUROPE
2015
Cross-border acquisitions play an important role in the corporate strategic development and international expansion. The paper summarizes the results of the dissertation, which intends to establish vital link between research and practice, deeply exploring the risk assessment methods and the scope of due diligence audit in the pre-acquisition phase. The central hypothesis of the comprehensive model stated that thorough due diligence in the pre-acquisition phase is necessary to make successful cross-border acquisition. The empirical evidence has been drawn on data sample of acquisitions made by automotive firms in cross-border acquisitions in the Central and Eastern Europe. The main results …
PROLISEAN: A New Security Protocol for Programmable Matter
2021
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…