28 research outputs found
An updated systematic review and network meta-analysis of 25 randomized trials assessing the efficacy and safety of treatments in COVID-19 disease
To date, there is no definite effective treatment for the COVID-19 pandemic. We performed an update network meta-analysis to compare and rank COVID-19 treatments according to their efficacy and safety. Literature search was performed from MEDLINE and CENTRAL databases from inception to September 5, 2020. Randomized clinical trials (RCTs) which compared the effect of any pharmacological drugs versus standard care or placebo 28-day after hospitalization in adult patients with COVID-19 disease were included. Risk ratio (RR) and 95% CI were calculated for 28-day all-cause mortality, clinical improvement, any adverse event (AEs), and viral clearance. A total of 25 RCTs, evaluating 17 different treatments, and 11,597 participants were analyzed. Remdesivir for 10-day compared to standard care (RR 0.69, 95% CI [0.48–0.99]), and a low dose compared to a high dose of HCQ (0.38, [0.17–0.89]) were associated with a lower risk of death. A total of 2,766 patients experienced clinical improvement, a 5-day course of remdesivir was associated with a higher frequency of clinical improvement compared to standard care (RR 1.21, 95% CI [1.00–1.47]). Compared to standard care, remdesivir for both 5 and 10 days, lopinavir/ritonavir, and dexamethasone reduced the risk of any severe AEs by 52% (0.48, 0.34–0.67), 24% (0.77, 0.63–0.92), 40% (0.60, 0.37–0.98), and 50% (0.50, 0.25–0.98) respectively. In this study of hospitalized patients with COVID-19, administration of remdesivir for 10-day compared to standard care was associated with lower 28-day all-cause mortality and serious AEs, and higher clinical improvement rate. 
ANNEAU DE FEUILLETAGES D'Â’UNE VARIETE p-RIEMANNIENNE.
14 pagesHere, we establish the link between a structure almost product , a ring offoliations and a flag of foliations , and examine regularity conditions fora structure almost product becomes a product
User-Centric Security and Privacy Approaches in Untrusted Environments
Internet based information systems (and applications) such as cloud and Internet of Things (IoT) systems have evolved significantly in recent years due to advances in computing infrastructure and networking technologies. Organizations of all types and sizes are eager to adopt these systems to manage their information. In fact, these systems are significantly impacting the way we work, socialize, create and share information, and organize the ow of people, ideas, and things around the world. As a result, there is a dramatic growth of the number of people who can access services provided by these systems. While these systems provide significant benefits to users, service providers do not provide direct mechanisms for the users to control security and privacy of their data at the service providers. Existing practice requires users to implicitly trust the service providers and their security policies in managing and protecting users data. Loss of control over data as well as high security requirements of certain government agencies and organizations prevent endusers to fully trust service providers. The main reason being that existing cryptographic solutions for security and privacy are not reliable for rapidly changing data processing model used by IoT service providers. Cryptographic schemes are either deterministic (enables processing of encrypted data, but not very secure) or randomized (very secure, but doesn't support data processing). As a consequence, data is processed in the clear at the service providers, which lead to vulnerabilities for both insider and outsider attacks.In this thesis, we particularly focus on user-centric, untrusted cloud and IoT based information systems, and investigate techniques and approaches to empower users to take control of their security and privacy needs in these untrusted environments. Cloud computing services are organized into three broad categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS). The same service models are also applicable to IoT services. We use these service models as the basis for performing deeper analysis of data security and privacy issues and challenges in both, cloud and IoT systems. Our proposed solutions span across these service models (IaaS, PaaS, SaaS) for both, cloud and IoT systems.We first present Nomad, a framework for building highly secure cloud-based systems in the PaaS and IaaS models of cloud computing. The underlying cryptographic scheme used by Nomad to secure data in the cloud is a fully homomorphic encryption scheme, which has the advantage of enabling computations to be performed directly on encrypted data. Nomad employs a GPU-based parallelization mechanism to accelerate the expensive homomorphic encryption operations. We implemented an end-to-end, cloud-based, mission-critical defense application, using the Nomad framework to demonstrate its feasibility.We then propose CloudProtect, a policy-based, extensible privacy middleware that empowers users to encrypt their sensitive data stored within various third-party cloud applications in the SaaS cloud model. It supplements existing cloud applications with a mechanism for protecting users data, with minimal disruption of user experience. We implemented a prototype of the privacy middleware with two applications, namely, Google Calendar and Google Docs. Our experimental results highlight the usefulness of the tradeoff between privacy, usability, and efficiency.We finally introduce IoTtrust, a framework to ensure trust and con defense in IoT systems for both users and the infrastructure in the IaaS and PaaS models of IoT. IoTtrust includes an IoT policy language for specifying users' preferences and the system policies regarding users data collection and processing by the system; a contract management mechanism for generating application level contracts between users and the IoT system based on their agreed policies, and translating those contracts into the IoT devices, where they need to be enforced; and attestation schemes for attesting the integrity of contracts translation, and contracts enforcement across all devices. We implemented IoTtrust and integrated it with TIPPERS to make it a trustworthy IoT system
RESOLUTION DE L’EQUATION COHOMOLOGIQUE D’UN C^2-AUTOMORPHISME SINGULIER
Nos remerciements à Aziz Elkacimi pour tous les échanges combien fructueux qu'on a eus ensemble.Here we solve on the equation \begin{equation*}f(z,w)-f(e^{2i\pi \theta}z+w, e^{2i\pi \theta}w)=g(z,w)\end{equation*} and show that the corresponding discrete cohomomology group depends only on the arithmetic nature of the real parameter .1991 Mathematics Subject Classification : 53C12 ; 37C85. Key words and phrases : Feuilletage, système dynamique, équations cohomologiques discrète et continue. Nos remerciements à Aziz Elkacimi pour tous les échanges combien fructueux qu'on a eus ensemble Abstract. Here we solve on ℂ 2 the equation (,) − (2 + , 2) = (,) and show that the corresponding discrete cohomomology group depends only on the arithmetic nature of the real parameter. • • • 1 POSITION DU PROBLÈME Pour replacer le problème dans un cadre mathématique approprié, on commen-cera par les rappels qui suivent