162 research outputs found

    Les langues Ă©trangĂšres dans l’Histoire de la Peinture en Italie

    Get PDF
    Les xĂ©nismes qui abondent dans l’Histoire de la peinture en Italie ont une fonction apotropaĂŻque, et visent Ă  prĂ©server la sacralitĂ© de l’émotion esthĂ©tique

    Winckelmann au temple des arts

    Get PDF
    Dans l’Histoire de la peinture en Italie, Stendhal ne se contente pas de suivre la thĂ©orie winckelmannienne du « beau idĂ©al antique ». Il emprunte Ă©galement Ă  Winckelmann sa dĂ©marche expĂ©rimentale, son esthĂ©tique fondĂ©e sur la sympathie, la sensualitĂ© et l’enthousiasme, ainsi qu’une certaine forme de discours sur l’art dans laquelle la psychologie et la poĂ©sie complĂštent l’ekphrasis : Stendhal emprunte Ă  Winckelmann sa thĂ©orie romantique de la rĂ©ception

    Stendhal au Salon de 1824 : pour une maniĂšre brĂšve dans la peinture

    Get PDF
    Stendhal importe au Salon de peinture son combat pour le romanticisme. Le corollaire de cette transposition est la promotion d’une forme brĂšve, et d’une esthĂ©tique de la briĂšvetĂ©. Cette maniĂšre brĂšve de la peinture se dĂ©finit par le petit format, la concision, l’intensitĂ©, la simplicitĂ© et l’indĂ©termination. Stendhal n’apprĂ©cie cependant pas la briĂšvetĂ© d’exĂ©cution et l’apparente nĂ©gligence des tableaux romantiques, et considĂšre que seule la perfection du dessin rend possible l’émotion esthĂ©tique

    NectarCAM : a camera for the medium size telescopes of the Cherenkov Telescope Array

    Full text link
    NectarCAM is a camera proposed for the medium-sized telescopes of the Cherenkov Telescope Array (CTA) covering the central energy range of ~100 GeV to ~30 TeV. It has a modular design and is based on the NECTAr chip, at the heart of which is a GHz sampling Switched Capacitor Array and a 12-bit Analog to Digital converter. The camera will be equipped with 265 7-photomultiplier modules, covering a field of view of 8 degrees. Each module includes the photomultiplier bases, high voltage supply, pre-amplifier, trigger, readout and Ethernet transceiver. The recorded events last between a few nanoseconds and tens of nanoseconds. The camera trigger will be flexible so as to minimize the read-out dead-time of the NECTAr chips. NectarCAM is designed to sustain a data rate of more than 4 kHz with less than 5\% dead time. The camera concept, the design and tests of the various subcomponents and results of thermal and electrical prototypes are presented. The design includes the mechanical structure, cooling of the electronics, read-out, clock distribution, slow control, data-acquisition, triggering, monitoring and services.Comment: In Proceedings of the 34th International Cosmic Ray Conference (ICRC2015), The Hague, The Netherlands. All CTA contributions at arXiv:1508.0589

    The Cherenkov Telescope Array Large Size Telescope

    Full text link
    The two arrays of the Very High Energy gamma-ray observatory Cherenkov Telescope Array (CTA) will include four Large Size Telescopes (LSTs) each with a 23 m diameter dish and 28 m focal distance. These telescopes will enable CTA to achieve a low-energy threshold of 20 GeV, which is critical for important studies in astrophysics, astroparticle physics and cosmology. This work presents the key specifications and performance of the current LST design in the light of the CTA scientific objectives.Comment: 4 pages, 5 figures, In Proceedings of the 33rd International Cosmic Ray Conference (ICRC2013), Rio de Janeiro (Brazil). All CTA contributions at arXiv:1307.223

    An Assessment of the Effectiveness of High Definition Cameras as Remote Monitoring Tools for Dolphin Ecology Studies.

    Get PDF
    Research involving marine mammals often requires costly field programs. This paper assessed whether the benefits of using cameras outweighs the implications of having personnel performing marine mammal detection in the field. The efficacy of video and still cameras to detect Indo-Pacific bottlenose dolphins (Tursiops aduncus) in the Fremantle Harbour (Western Australia) was evaluated, with consideration on how environmental conditions affect detectability. The cameras were set on a tower in the Fremantle Port channel and videos were perused at 1.75 times the normal speed. Images from the cameras were used to estimate position of dolphins at the water’s surface. Dolphin detections ranged from 5.6 m to 463.3 m for the video camera, and from 10.8 m to 347.8 m for the still camera. Detection range showed to be satisfactory when compared to distances at which dolphins would be detected by field observers. The relative effect of environmental conditions on detectability was considered by fitting a Generalised Estimation Equations (GEEs) model with Beaufort, level of glare and their interactions as predictors and a temporal auto-correlation structure. The best fit model indicated level of glare had an effect, with more intense periods of glare corresponding to lower occurrences of observed dolphins. However this effect was not large (-0.264) and the parameter estimate was associated with a large standard error (0.113).The limited field of view was the main restraint in that cameras can be only applied to detections of animals observed rather than counts of individuals. However, the use of cameras was effective for long term monitoring of occurrence of dolphins, outweighing the costs and reducing the health and safety risks to field personal. This study showed that cameras could be effectively implemented onshore for research such as studying changes in habitat use in response to development and construction activities

    Risky Traitor Tracing and New Differential Privacy Negative Results

    Get PDF
    In this work we seek to construct collusion-resistant traitor tracing systems with small ciphertexts from standard assumptions that also move toward practical efficiency. In our approach we will hold steadfast to the principle of collusion resistance, but relax the requirement on catching a traitor from a successful decoding algorithm. We define a ff-risky traitor tracing system as one where the probability of identifying a traitor is f(λ,n)f(\lambda,n) times the probability a successful box is produced. We then go on to show how to build such systems from prime order bilinear groups with assumptions close to those used in prior works. Our core system achieves, for any k>0k > 0, f(λ,n)≈kn+k−1f(\lambda,n) \approx \frac{k}{n + k - 1} where ciphertexts consists of (k+4)(k + 4) group elements and decryption requires (k+3)(k + 3) pairing operations. At first glance the utility of such a system might seem questionable since the ff we achieve for short ciphertexts is relatively small. Indeed an attacker in such a system can more likely than not get away with producing a decoding box. However, we believe this approach to be viable for four reasons: 1. A risky traitor tracing system will provide deterrence against risk averse attackers. In some settings the consequences of being caught might bear a high cost and an attacker will have to weigh his utility of producing a decryption DD box against the expected cost of being caught. 2. Consider a broadcast system where we want to support low overhead broadcast encrypted communications, but will periodically allow for a more expensive key refresh operation. We refer to an adversary produced algorithm that maintains the ability to decrypt across key refreshes as a persistent decoder. We show how if we employ a risky traitor tracing systems in this setting, even for a small ff, we can amplify the chances of catching such a ``persistent decoder\u27\u27 to be negligibly close to 1. 3. In certain resource constrained settings risky traitor tracing provides a best tracing effort where there are no other collusion-resistant alternatives. For instance, suppose we had to support 100K users over a radio link that had just 10KB of additional resources for extra ciphertext overhead. None of the existing N\sqrt N bilinear map systems can fit in these constraints. On the other hand a risky traitor tracing system provides a spectrum of tracing probability versus overhead tradeoffs and can be configured to at least give some deterrence in this setting. 4. Finally, we can capture impossibility results for differential privacy from 1n\frac{1}{n}-risky traitor tracing. Since our ciphertexts are short (O(λ)O(\lambda)), we get the negative result which matches what one would get plugging in the obfuscation based tracing system Boneh-Zhandry (CRYPTO 2014) solution into the prior impossibility result of Dwork et al. (STOC 2009)

    Utilization of mechanical power and associations with clinical outcomes in brain injured patients. a secondary analysis of the extubation strategies in neuro-intensive care unit patients and associations with outcome (ENIO) trial

    Get PDF
    BackgroundThere is insufficient evidence to guide ventilatory targets in acute brain injury (ABI). Recent studies have shown associations between mechanical power (MP) and mortality in critical care populations. We aimed to describe MP in ventilated patients with ABI, and evaluate associations between MP and clinical outcomes.MethodsIn this preplanned, secondary analysis of a prospective, multi-center, observational cohort study (ENIO, NCT03400904), we included adult patients with ABI (Glasgow Coma Scale <= 12 before intubation) who required mechanical ventilation (MV) >= 24 h. Using multivariable log binomial regressions, we separately assessed associations between MP on hospital day (HD)1, HD3, HD7 and clinical outcomes: hospital mortality, need for reintubation, tracheostomy placement, and development of acute respiratory distress syndrome (ARDS).ResultsWe included 1217 patients (mean age 51.2 years [SD 18.1], 66% male, mean body mass index [BMI] 26.3 [SD 5.18]) hospitalized at 62 intensive care units in 18 countries. Hospital mortality was 11% (n = 139), 44% (n = 536) were extubated by HD7 of which 20% (107/536) required reintubation, 28% (n = 340) underwent tracheostomy placement, and 9% (n = 114) developed ARDS. The median MP on HD1, HD3, and HD7 was 11.9 J/min [IQR 9.2-15.1], 13 J/min [IQR 10-17], and 14 J/min [IQR 11-20], respectively. MP was overall higher in patients with ARDS, especially those with higher ARDS severity. After controlling for same-day pressure of arterial oxygen/fraction of inspired oxygen (P/F ratio), BMI, and neurological severity, MP at HD1, HD3, and HD7 was independently associated with hospital mortality, reintubation and tracheostomy placement. The adjusted relative risk (aRR) was greater at higher MP, and strongest for: mortality on HD1 (compared to the HD1 median MP 11.9 J/min, aRR at 17 J/min was 1.22, 95% CI 1.14-1.30) and HD3 (1.38, 95% CI 1.23-1.53), reintubation on HD1 (1.64; 95% CI 1.57-1.72), and tracheostomy on HD7 (1.53; 95%CI 1.18-1.99). MP was associated with the development of moderate-severe ARDS on HD1 (2.07; 95% CI 1.56-2.78) and HD3 (1.76; 95% CI 1.41-2.22).ConclusionsExposure to high MP during the first week of MV is associated with poor clinical outcomes in ABI, independent of P/F ratio and neurological severity. Potential benefits of optimizing ventilator settings to limit MP warrant further investigation
    • 

    corecore