277 research outputs found

    Probing superfluidity in a quasi two-dimensional Bose gas through its local dynamics

    Full text link
    We report direct evidence of superfluidity in a quasi two-dimensional Bose gas by observing its dynamical response to a collective excitation. Relying on a novel local correlation analysis, we are able to probe inhomogeneous clouds and reveal their local dynamics. We identify in this way the superfluid and thermal phases inside the gas and locate the boundary at which the Berezinskii--Kosterlitz--Thouless crossover occurs. This new analysis also allows to evidence the coupling of the two fluids which induces at finite temperatures damping rates larger than the usual Landau damping

    Patient-specific simulation of stent-graft deployment within an abdominal aortic aneurysm

    Get PDF
    In this study, finite element analysis is used to simulate the surgical deployment procedure of a bifurcated stent-graft on a real patient's arterial geometry. The stent-graft is modeled using realistic constitutive properties for both the stent and most importantly for the graft. The arterial geometry is obtained from pre-operative imaging exam. The obtained results are in good agreement with the post-operative imaging data. As the whole computational time was reduced to less than 2 hours, this study constitutes an essential step towards predictive planning simulations of aneurysmal endovascular surger

    Preventing plant-pedestrian collisions: Camera & screen systems and visibility from the driving position

    Get PDF
    International audienceThe issue of collisions between plant or site vehicles and pedestrians concerns numerous sectors of activity. Lack of visibility for drivers over their direct environments is one of the main causes of such accidents, which are often serious. Visibility can be improved indirectly by using camera-and-screen systems. This article gives the findings of a study on the detectability of a pedestrian by a driver using such a system in various configurations. It is thus recommended that, under the most unfavourable conditions, any pedestrian entering the danger zone be shown on the screen with at least a minimum height of 10 mm. Since the risk of non-detection is higher at the edges of the screen than at the centre, it is also recommended that the detection zone of the system cover an area extending beyond the danger zone under surveillance. Finally, since the size of the screen does not have a significant influence on detection, the choice of the screen size should be governed more by criteria regarding the fitting out of and the ergonomics of the cab or of the driving position

    Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES

    Get PDF
    Motivated by progress in the field of zero-knowledge proofs, so-called Arithmetization-Oriented (AO) symmetric primitives have started to appear in the literature, such as MiMC, Poseidon or Rescue. Due to the design constraints implied by this setting, these algorithms are defined using simple operations over large (possibly prime) fields. In particular, many rely on simple low-degree monomials for their non-linear layers, essentially using x ↦ x3 as an S-box. In this paper, we show that the structure of the material injected in each round (be it subkeys in a block cipher or round constants in a public permutation) could allow a specific pattern, whereby a well-defined affine space is mapped to another by the round function, and then to another, etc. Such chains of one-dimensional subspaces always exist over 2 rounds, and they can be extended to an arbitrary number of rounds, for any linear layer, provided that the round-constants are well chosen. As a consequence, for several ciphers like Rescue, or a variant of AES with a monomial Sbox, there exist some round-key sequences for which the cipher has an abnormally high differential uniformity, exceeding the size of the Sbox alphabet. Well-known security arguments, in particular based on the wide-trail strategy, have been reused in the AO setting by many designers. Unfortunately, our results show that such a traditional study may not be sufficient to guarantee security. To illustrate this, we present two new primitives (the tweakable block cipher Snare and the permutation-based hash function Stir) that are built using state-of-the-art security arguments, but which are actually deeply flawed. Indeed, the key schedule of Snare ensures the presence of a subspace chain that significantly simplifies an algebraic attack against it, and the round constants of Stir force the presence of a subspace chain aligned with the rate and capacity of the permutation. This in turns implies the existence of many easy-to-find solutions to the so-called CICO problem

    Patient-specific numerical simulation of stent-graft deployment: Validation on three clinical cases.

    No full text
    International audienceEndovascular repair of abdominal aortic aneurysms faces some adverse outcomes, such as kinks or endoleaks related to incomplete stent apposition, which are difficult to predict and which restrain its use although it is less invasive than open surgery. Finite element simulations could help to predict and anticipate possible complications biomechanically induced, thus enhancing practitioners' stent-graft sizing and surgery planning, and giving indications on patient eligibility to endovascular repair. The purpose of this work is therefore to develop a new numerical methodology to predict stent-graft final deployed shapes after surgery. The simulation process was applied on three clinical cases, using preoperative scans to generate patient-specific vessel models. The marketed devices deployed during the surgery, consisting of a main body and one or more iliac limbs or extensions, were modeled and their deployment inside the corresponding patient aneurysm was simulated. The numerical results were compared to the actual deployed geometry of the stent-grafts after surgery that was extracted from postoperative scans. We observed relevant matching between simulated and actual deployed stent-graft geometries, especially for proximal and distal stents outside the aneurysm sac which are particularly important for practitioners. Stent locations along the vessel centerlines in the three simulations were always within a few millimeters to actual stents locations. This good agreement between numerical results and clinical cases makes finite element simulation very promising for preoperative planning of endovascular repair

    The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives

    Get PDF
    In this paper, we present a new type of algebraic attack that applies to many recent arithmetization-oriented families of permutations, such as those used in Griffin, Anemoi, ArionHash, and XHash8, whose security relies on the hardness of the constrained-input constrained-output (CICO) problem. We introduce the FreeLunch approach: the monomial ordering is chosen so that the natural polynomial system encoding the CICO problem already is a Gröbner basis. In addition, we present a new dedicated resolution algorithm for FreeLunch systems of complexity lower than applicable state-of-the-art FGLM algorithms. We show that the FreeLunch approach challenges the security of fullround instances of Anemoi, Arion and Griffin. We confirm these theoretical results with experimental results on those three permutations. In particular, using the FreeLunch attack combined with a new technique to bypass 3 rounds of Griffin, we recover a CICO solution for 7 out of 10 rounds of Griffin in less than four hours on one core of AMD EPYC 7352 (2.3GHz)

    Can routinely recorded reproductive events be used as indicators of disease emergence in dairy cattle? An evaluation of 5 indicators during the emergence of bluetongue virus in France in 2007 and 2008

    Get PDF
    AbstractIn response to increasing risks of emerging infectious diseases, syndromic surveillance can be a suitable approach to detect outbreaks of such diseases across a large territory in an early phase. To implement a syndromic surveillance system, the primary challenge is to find appropriate health-related data. The objective of this study was to evaluate whether routinely collected dates of reproductive events in dairy cattle could be used to build indicators of health anomalies for syndromic surveillance. The evaluation was performed on data collected in France between 2003 and 2009. First, a set of 5 indicators was proposed to assess several types of reproductive disorders. For each indicator, the demographic coverage over the total number of cattle at risk was analyzed in time and space. Second, the ability to detect an emerging disease in an early phase was retrospectively evaluated during epidemics of bluetongue serotypes 1 and 8 (BTV-1, BTV-8) in France in 2007 and 2008. Reproductive indicators were analyzed weekly during these epidemics for each indicator in each infected French district (16 in 2007 and 50 in 2008 out of 94 districts). The indicators were able to detect the BTV epidemics despite their low demographic coverage on a weekly basis relatively to total number of cattle (median=1.21%; range=0–11.7%). Four indicators related to abortions, late embryonic death, and short gestations were abnormally elevated during both BTV epidemics. Median times to abnormal elevations in these indicators were 20 to 71 d after the first notification of clinical signs of BTV by veterinarians. These results demonstrate that reproduction data can be used as indicators of disease emergences, whereas in the specific case of these BTV epidemics, detection via these indicators was later than clinical detection by veterinarians. The emergence of bluetongue in 2007 in France was associated with gestations that were a few days shorter than expected. A short gestation indicator underwent high elevations relative to prior random fluctuations and was the earliest (out of the 4 indicators) to show abnormal elevations, making it possible to detect this emergence

    HSAF-induced antifungal effects in Candida albicans through ROS-mediated apoptosis

    Get PDF
    Heat-stable antifungal factor (HSAF) belongs to polycyclic tetramate macrolactams (PTMs), which inhibits many fungal pathogens and is effective in inhibiting Candida albicans (C. albicans). In this study, we found that HSAF induced the apoptosis of C. albicans SC5314 through inducing the production of reactive oxygen species (ROS). Nevertheless, we validated the efficacy of HSAF against candidiasis caused by C. albicans in a murine model in vivo,and HSAF significantly improved survival and reduced fungal burden compared to vehicles. A molecular dynamics (MD) simulation was also investigated, revealing the theoretical binding mode of HSAF to the β-tubulin of C. albicans. This study first found PTMs-induced fungal apoptosis through ROS accumulation in C. albicans and its potential as a novel agent for fungicides

    Measurement of the top quark forward-backward production asymmetry and the anomalous chromoelectric and chromomagnetic moments in pp collisions at √s = 13 TeV

    Get PDF
    Abstract The parton-level top quark (t) forward-backward asymmetry and the anomalous chromoelectric (d̂ t) and chromomagnetic (μ̂ t) moments have been measured using LHC pp collisions at a center-of-mass energy of 13 TeV, collected in the CMS detector in a data sample corresponding to an integrated luminosity of 35.9 fb−1. The linearized variable AFB(1) is used to approximate the asymmetry. Candidate t t ¯ events decaying to a muon or electron and jets in final states with low and high Lorentz boosts are selected and reconstructed using a fit of the kinematic distributions of the decay products to those expected for t t ¯ final states. The values found for the parameters are AFB(1)=0.048−0.087+0.095(stat)−0.029+0.020(syst),μ̂t=−0.024−0.009+0.013(stat)−0.011+0.016(syst), and a limit is placed on the magnitude of | d̂ t| < 0.03 at 95% confidence level. [Figure not available: see fulltext.
    corecore