474 research outputs found
Heterogeneous Clutter Models for Change Detection in PolSAR Imagery
International audienceThe new generation of Synthetic Aperture Radar (RADARSAT-2, TerraSAR-X, ALOS, . . . ) allows us to capture Earth surface images with very high resolution. Therefore the possibility to characterize objects has become more and more attainable. Moreover, the short revisit time propertie of these satellites enables the development of techniques of change detection and their applications. Spherically Invariant Random Vector (SIRV) model was designed specifically for the analysis of heterogeneous clutters in high resolution radar images. In this paper, we propose four algorithms of change detection based on different criteria including: Gaussian (sample covariance matrix estimator), Gaussian (fixed point estimator), Fisher texture-based and KummerU-based (Fisher distributed texture)
Following G-quadruplex formation by its intrinsic fluorescence
AbstractWe characterized and compared the fluorescence properties of various well-defined G-quadruplex structures. The increase of intrinsic fluorescence of G-rich DNA sequences when they form G-quadruplexes can be used to monitor the folding and unfolding of G-quadruplexes as a function of cations and temperature. The temperature-dependent fluorescence spectra of different G-quadruplexes also exhibit characteristic patterns. Thus, the stability and possibly also the structure of G-quadruplexes can be characterized and distinguished by their intrinsic fluorescence spectra
An overview of Λ-type operations on quasi-symmetric functions
in "Special issue dedicated to the memory of A.I. Kostrikin"Cet article est un article de survol des propriétés de type Lambda-anneau de l'algèbre des fonctions quasi-symétriques
SMART SECURITY MANAGEMENT IN SECURE DEVICES
International audienceAmong other threats, secure components are subjected tophysical attacks whose aim is to recover the secret information theystore. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one byone. But this “countermeasure-centered” approach drastically decreasesthe performance of the chip in terms of power, speed and availability.In order to overcome this limitation, we propose a complementary approach: smart dynamic management of the whole set of countermeasuresembedded in the component. Three main specifications for such management are required in a real world application (for example, a conditionalaccess system for Pay-TV): it has to provide capabilities for the chip todistinguish between attacks and normal use cases (without the help of ahuman being and in a robust but versatile way); it also has to be basedon mechanisms which dynamically find a trade-off between security andperformance; all these mecanisms have to formalized in a way which isclearly understandable by the designer. In this article, a prototype whichenables such security management is described. The solution is based ona double-processor architecture: one processor embeds a representativeset of countermeasures (and mechanisms to define their parameters) andexecutes the application code. The second processor, on the same chip,applies a given security strategy, but without requesting sensitive datafrom the first processor. The chosen strategy is based on fuzzy logic reasoning to enable the designer to describe, using a fairly simple formalism,both the attack paths and the normal use cases. A proof of concept hasbeen proposed for the smart card part of a conditional access for Pay-TV,but it could easily be fine-tuned for other applications
- …