98 research outputs found

    Sleep deprivation and Modafinil affect cortical sources of resting state electroencephalographic rhythms in healthy young adults

    Get PDF
    Objective: It has been reported that sleep deprivation affects the neurophysiological mechanisms underpinning the vigilance. Here, we tested the following hypotheses in the PharmaCog project (www.pharmacog.org): (i) sleep deprivation may alter posterior cortical delta and alpha sources of resting state eyes-closed electroencephalographic (rsEEG) rhythms in healthy young adults; (ii) after the sleep deprivation, a vigilance enhancer may recover those rsEEG source markers. Methods: rsEEG data were recorded in 36 healthy young adults before (Pre-sleep deprivation) and after (Post-sleep deprivation) one night of sleep deprivation. In the Post-sleep deprivation, these data were collected after a single dose of PLACEBO or MODAFINIL. rsEEG cortical sources were estimated by eLORETA freeware. Results: In the PLACEBO condition, the sleep deprivation induced an increase and a decrease in posterior delta (2–4 Hz) and alpha (8–13 Hz) source activities, respectively. In the MODAFINIL condition, the vigilance enhancer partially recovered those source activities. Conclusions: The present results suggest that posterior delta and alpha source activities may be both related to the regulation of human brain arousal and vigilance in quiet wakefulness. Significance: Future research in healthy young adults may use this methodology to preselect new symptomatic drug candidates designed to normalize brain arousal and vigilance in seniors with dementia

    SIKE Round 2 Speed Record on ARM Cortex-M4

    Get PDF
    We present the first practical software implementation of Supersingular Isogeny Key Encapsulation (SIKE) round 2, targeting NIST’s 1, 2, and 5 security levels on 32-bit ARM Cortex-M4 microcontrollers. The proposed library introduces a new speed record of SIKE protocol on the target platform. We achieved this record by adopting several state-of-the-art engineering techniques as well as highly-optimized hand-crafted assembly implementation of finite field arithmetic. In particular, we carefully redesign the previous optimized implementations of filed arithmetic on 32-bit ARM Cortex-M4 platform and propose a set of novel techniques which are explicitly suitable for SIKE/SIDH primes. Moreover, the proposed arithmetic implementations are fully scalable to larger bit-length integers and can be adopted over different security levels. The benchmark result on STM32F4 Discovery board equipped with 32-bit ARM Cortex-M4 microcontrollers shows that the entire key encapsulation over p434 takes about 326 million clock cycles (i.e. 1.94 seconds @168MHz). In contrast to the previous optimized implementation of the isogeny-based key exchange on low-power 32-bit ARM Cortex-M4, our performance evaluation shows feasibility of using SIKE mechanism on the target platform. In comparison to the most of the post-quantum candidates, SIKE requires an excessive number of arithmetic operations, resulting in significantly slower timings. However, its small key size makes this scheme as a promising candidate on low-end microcontrollers in the quantum era by ensuring the lower energy consumption for key transmission than other schemes

    Training in the practice of noninvasive brain stimulation: Recommendations from an IFCN committee

    Get PDF
    As the field of noninvasive brain stimulation (NIBS) expands, there is a growing need for comprehensive guidelines on training practitioners in the safe and effective administration of NIBS techniques in their various research and clinical applications. This article provides recommendations on the structure and content of this training. Three different types of practitioners are considered (Technicians, Clinicians, and Scientists), to attempt to cover the range of education and responsibilities of practitioners in NIBS from the laboratory to the clinic. Basic or core competencies and more advanced knowledge and skills are discussed, and recommendations offered regarding didactic and practical curricular components. We encourage individual licensing and governing bodies to implement these guidelines

    Diagnosis of prodromal and Alzheimer's disease dementia in adults with Down syndrome using neuropsychological tests

    Get PDF
    We aimed to define prodromal Alzheimer's disease (AD) and AD dementia using normative neuropsychological data in a large population-based cohort of adults with Down syndrome (DS). Cross-sectional study. DS participants were classified into asymptomatic, prodromal AD and AD dementia, based on neurologist's judgment blinded to neuropsychological data (Cambridge Cognitive Examination for Older Adults with Down's syndrome [CAMCOG-DS] and modified Cued Recall Test [mCRT]). We compared the cutoffs derived from the normative data in young adults with DS to those from receiver-operating characteristic curve (ROC) analysis. Diagnostic performance of the CAMCOG-DS and modified Cued Recall Test (mCRT) in subjects with mild and moderate levels of intellectual disability (ID) was high, both for diagnosing prodromal AD and AD dementia (area under the curve [AUC] 0.73-0.83 and 0.90-1, respectively). The cutoffs derived from the normative data were similar to those derived from the ROC analyses. Diagnosing prodromal AD and AD dementia in DS with mild and moderate ID using population norms for neuropsychological tests is possible with high diagnostic accuracy

    On the cost of computing isogenies between supersingular elliptic curves

    Get PDF
    The security of the Jao-De Feo Supersingular Isogeny Diffie-Hellman (SIDH) key agreement scheme is based on the intractability of the Computational Supersingular Isogeny (CSSI) problem --- computing Fp2{\mathbb F}_{p^2}-rational isogenies of degrees 2e2^e and 3e3^e between certain supersingular elliptic curves defined over Fp2{\mathbb F}_{p^2}. The classical meet-in-the-middle attack on CSSI has an expected running time of O(p1/4)O(p^{1/4}), but also has O(p1/4)O(p^{1/4}) storage requirements. In this paper, we demonstrate that the van Oorschot-Wiener collision finding algorithm has a lower cost (but higher running time) for solving CSSI, and thus should be used instead of the meet-in-the-middle attack to assess the security of SIDH against classical attacks. The smaller parameter pp brings significantly improved performance for SIDH

    Accuracy and reproducibility of automated white matter hyperintensities segmentation with lesion segmentation tool: A European multi-site 3T study

    Get PDF
    Brain vascular damage accumulate in aging and often manifest as white matter hyperintensities (WMHs) on MRI. Despite increased interest in automated methods to segment WMHs, a gold standard has not been achieved and their longitudinal reproducibility has been poorly investigated. The aim of present work is to evaluate accuracy and reproducibility of two freely available segmentation algorithms. A harmonized MRI protocol was implemented in 3T-scanners across 13 European sites, each scanning five volunteers twice (test-retest) using 2D-FLAIR. Automated segmentation was performed using Lesion segmentation tool algorithms (LST): the Lesion growth algorithm (LGA) in SPM8 and 12 and the Lesion prediction algorithm (LPA). To assess reproducibility, we applied the LST longitudinal pipeline to the LGA and LPA outputs for both the test and retest scans. We evaluated volumetric and spatial accuracy comparing LGA and LPA with manual tracing, and for reproducibility the test versus retest. Median volume difference between automated WMH and manual segmentations (mL) was −0.22[IQR = 0.50] for LGA-SPM8, −0.12[0.57] for LGA-SPM12, −0.09[0.53] for LPA, while the spatial accuracy (Dice Coefficient) was 0.29[0.31], 0.33[0.26] and 0.41[0.23], respectively. The reproducibility analysis showed a median reproducibility error of 20%[IQR = 41] for LGA-SPM8, 14% [31] for LGA-SPM12 and 10% [27] with the LPA cross-sectional pipeline. Applying the LST longitudinal pipeline, the reproducibility errors were considerably reduced (LGA: 0%[IQR = 0], p < 0.001; LPA: 0% [3], p < 0.001) compared to those derived using the cross-sectional algorithms. The DC using the longitudinal pipeline was excellent (median = 1) for LGA [IQR = 0] and LPA [0.02]. LST algorithms showed moderate accuracy and good reproducibility. Therefore, it can be used as a reliable cross-sectional and longitudinal tool in multi-site studies

    Computing supersingular isogenies on Kummer surfaces

    Get PDF
    We apply Scholten\u27s construction to give explicit isogenies between the Weil restriction of supersingular Montgomery curves with full rational 2-torsion over GF(p2)GF(p^2) and corresponding abelian surfaces over GF(p)GF(p). Subsequently, we show that isogeny-based public key cryptography can exploit the fast Kummer surface arithmetic that arises from the theory of theta functions. In particular, we show that chains of 2-isogenies between elliptic curves can instead be computed as chains of Richelot (2,2)-isogenies between Kummer surfaces. This gives rise to new possibilities for efficient supersingular isogeny-based cryptography
    • …
    corecore