168 research outputs found

    Why one-size-fits-all vaso-modulatory interventions fail to control glioma invasion: in silico insights

    Full text link
    There is an ongoing debate on the therapeutic potential of vaso-modulatory interventions against glioma invasion. Prominent vasculature-targeting therapies involve functional tumour-associated blood vessel deterioration and normalisation. The former aims at tumour infarction and nutrient deprivation medi- ated by vascular targeting agents that induce occlusion/collapse of tumour blood vessels. In contrast, the therapeutic intention of normalising the abnormal structure and function of tumour vascular net- works, e.g. via alleviating stress-induced vaso-occlusion, is to improve chemo-, immuno- and radiation therapy efficacy. Although both strategies have shown therapeutic potential, it remains unclear why they often fail to control glioma invasion into the surrounding healthy brain tissue. To shed light on this issue, we propose a mathematical model of glioma invasion focusing on the interplay between the mi- gration/proliferation dichotomy (Go-or-Grow) of glioma cells and modulations of the functional tumour vasculature. Vaso-modulatory interventions are modelled by varying the degree of vaso-occlusion. We discovered the existence of a critical cell proliferation/diffusion ratio that separates glioma invasion re- sponses to vaso-modulatory interventions into two distinct regimes. While for tumours, belonging to one regime, vascular modulations reduce the tumour front speed and increase the infiltration width, for those in the other regime the invasion speed increases and infiltration width decreases. We show how these in silico findings can be used to guide individualised approaches of vaso-modulatory treatment strategies and thereby improve success rates

    Autoregressive Attention Neural Networks for Non-Line-of-Sight User Tracking with Dynamic Metasurface Antennas

    Full text link
    User localization and tracking in the upcoming generation of wireless networks have the potential to be revolutionized by technologies such as the Dynamic Metasurface Antennas (DMAs). Commonly proposed algorithmic approaches rely on assumptions about relatively dominant Line-of-Sight (LoS) paths, or require pilot transmission sequences whose length is comparable to the number of DMA elements, thus, leading to limited effectiveness and considerable measurement overheads in blocked LoS and dynamic multipath environments. In this paper, we present a two-stage machine-learning-based approach for user tracking, specifically designed for non-LoS multipath settings. A newly proposed attention-based Neural Network (NN) is first trained to map noisy channel responses to potential user positions, regardless of user mobility patterns. This architecture constitutes a modification of the prominent vision transformer, specifically modified for extracting information from high-dimensional frequency response signals. As a second stage, the NN's predictions for the past user positions are passed through a learnable autoregressive model to exploit the time-correlated channel information and obtain the final position predictions. The channel estimation procedure leverages a DMA receive architecture with partially-connected radio frequency chains, which results to reduced numbers of pilots. The numerical evaluation over an outdoor ray-tracing scenario illustrates that despite LoS blockage, this methodology is capable of achieving high position accuracy across various multipath settings.Comment: 5 pages, 3 figures, accepted for presentation by 2023 IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP 2023

    A Framework for Control Channels Applied to Reconfigurable Intelligent Surfaces

    Get PDF
    The research on Reconfigurable Intelligent Surfaces (RISs) has dominantly been focused on physical-layer aspects and analyses of the achievable adaptation of the propagation environment. Compared to that, the questions related to link/MAC protocol and system-level integration of RISs have received much less attention. This paper addresses the problem of designing and analyzing control/signaling procedures, which are necessary for the integration of RISs as a new type of network element within the overall wireless infrastructure. We build a general model for designing control channels along two dimensions: i) allocated bandwidth (in-band and out-of band) and ii) rate selection (multiplexing or diversity). Specifically, the second dimension results in two transmission schemes, one based on channel estimation and the subsequent adapted RIS configuration, while the other is based on sweeping through predefined RIS phase profiles. The paper analyzes the performance of the control channel in multiple communication setups, obtained as combinations of the aforementioned dimensions. While necessarily simplified, our analysis reveals the basic trade-offs in designing control channels and the associated communication algorithms. Perhaps the main value of this work is to serve as a framework for subsequent design and analysis of various system-level aspects related to the RIS technology.Comment: Submitted to IEEE TWC, the copyright may be transferred without further notic

    Quantum effects in a rotating spacetime

    Get PDF
    The behavior of a arbitrary coupled quantum scalar field is studied in the background of the G\"odel spacetime. Closed forms are derived for the effective action and the vacuum expectation value of quadratic field fluctuations by using ζ\zeta-function regularization. Based on these results, we argue that causality violation presented in this spacetime can not be removed by quantum effects.Comment: 17 pages, LaTe

    Co-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUs

    Get PDF
    Pattern matching is an important building block for many security applications, including Network Intrusion Detection Systems (NIDS). As NIDS grow in functionality and complexity, the time overhead and energy consumption of pattern matching become a significant consideration that limits the deployability of such systems, especially on resource-constrained devices.\ua0On the other hand, the emergence of new computing platforms, such as embedded devices with integrated, general-purpose Graphics Processing Units (GPUs), brings new, interesting challenges and opportunities for algorithm design in this setting: how to make use of new architectural features and how to evaluate their effect on algorithm performance. Up to now, work that focuses on pattern matching for such platforms has been limited to specific algorithms in isolation.In this work, we present a systematic and comprehensive benchmark that allows us to co-evaluate both existing and new pattern matching algorithms on heterogeneous devices equipped with embedded GPUs, suitable for medium- to high-level IoT deployments. We evaluate the algorithms on such a heterogeneous device, in close connection with the architectural features of the platform and provide insights on how these features affect the algorithms\u27 behavior. We find that, in our target embedded platform, GPU-based pattern matching algorithms have competitive performance compared to the CPU and consume half as much energy as the CPU-based variants.\ua0Based on these insights, we also propose HYBRID, a new pattern matching approach that efficiently combines techniques from existing approaches and outperforms them by 1.4x, across a range of realistic and synthetic data sets. Our benchmark details the effect of various optimizations, thus providing a path forward to make existing security mechanisms such as NIDS deployable on IoT devices

    Intrusion Detection in Industrial Networks via Data Streaming

    Get PDF
    Given the increasing threat surface of industrial networks due to distributed, Internet-of-Things (IoT) based system architectures, detecting intrusions in\ua0 Industrial IoT (IIoT) systems is all the more important, due to the safety implications of potential threats. The continuously generated data in such systems form both a challenge but also a possibility: data volumes/rates are high and require processing and communication capacity but they contain information useful for system operation and for detection of unwanted situations.In this chapter we explain that\ua0 stream processing (a.k.a. data streaming) is an emerging useful approach both for general applications and for intrusion detection in particular, especially since it can enable data analysis to be carried out in the continuum of edge-fog-cloud distributed architectures of industrial networks, thus reducing communication latency and gradually filtering and aggregating data volumes. We argue that usefulness stems also due to\ua0 facilitating provisioning of agile responses, i.e. due to potentially smaller latency for intrusion detection and hence also improved possibilities for intrusion mitigation. In the chapter we outline architectural features of IIoT networks, potential threats and examples of state-of-the art intrusion detection methodologies. Moreover, we give an overview of how leveraging distributed and parallel execution of streaming applications in industrial setups can influence the possibilities of protecting these systems. In these contexts, we give examples using electricity networks (a.k.a. Smart Grid systems).We conclude that future industrial networks, especially their Intrusion Detection Systems (IDSs), should take advantage of data streaming concept by decoupling semantics from the deployment

    Finite Number and Finite Size Effects in Relativistic Bose-Einstein Condensation

    Get PDF
    Bose-Einstein condensation of a relativistic ideal Bose gas in a rectangular cavity is studied. Finite size corrections to the critical temperature are obtained by the heat kernel method. Using zeta-function regularization of one-loop effective potential, lower dimensional critical temperatures are calculated. In the presence of strong anisotropy, the condensation is shown to occur in multisteps. The criteria of this behavior is that critical temperatures corresponding to lower dimensional systems are smaller than the three dimensional critical temperature.Comment: 18 pages, 9 figures, Fig.3 replaced, to appear in Physical Review

    O(N) Quantum fields in curved spacetime

    Full text link
    For the O(N) field theory with lambda Phi^4 self-coupling, we construct the two-particle-irreducible (2PI), closed-time-path (CTP) effective action in a general curved spacetime. From this we derive a set of coupled equations for the mean field and the variance. They are useful for studying the nonperturbative, nonequilibrium dynamics of a quantum field when full back reactions of the quantum field on the curved spacetime, as well as the fluctuations on the mean field, are required. Applications to phase transitions in the early Universe such as the Planck scale or in the reheating phase of chaotic inflation are under investigation.Comment: 31 pages, 2 figures, uses RevTeX 3.1, LaTeX 2e, AMSfonts 2.2, graphics 0.6; To appear in Phys. Rev. D (7/15/97

    Micromechanical study of the load transfer in a polycaprolactone-collagen hybrid scaffold when subjected to unconfined and confined compression

    Get PDF
    Scaffolds are used in diverse tissue engineering applications as hosts for cell proliferation and extracellular matrix formation. One of the most used tissue engineering materials is collagen, which is well known to be a natural biomaterial, also frequently used as cell substrate, given its natural abundance and intrinsic biocompatibility. This study aims to evaluate how the macroscopic biomechanical stimuli applied on a construct made of polycaprolactone scaffold embedded in a collagen substrate translate into microscopic stimuli at the cell level. Eight poro-hyperelastic finite element models of 3D printed hybrid scaffolds from the same batch were created, along with an equivalent model of the idealized geometry of that scaffold. When applying an 8% confined compression at the macroscopic level, local fluid flow of up to 20 [Formula: see text]m/s and octahedral strain levels mostly under 20% were calculated in the collagen substrate. Conversely unconfined compression induced fluid flow of up to 10 [Formula: see text]m/s and octahedral strain from 10 to 35%. No relevant differences were found amongst the scaffold-specific models. Following the mechanoregulation theory based on Prendergast et al. (J Biomech 30:539-548, 1997. https://doi.org/10.1016/S0021-9290(96)00140-6 ), those results suggest that mainly cartilage or fibrous tissue formation would be expected to occur under unconfined or confined compression, respectively. This in silico study helps to quantify the microscopic stimuli that are present within the collagen substrate and that will affect cell response under in vitro bioreactor mechanical stimulation or even after implantation
    • 

    corecore