284 research outputs found

    Les interventions infirmières permettant de prévenir le déclin fonctionnel chez les personnes âgées dans les milieux de soins aigus: une revue de littérature

    Get PDF
    Le vieillissement de la population est un phénomène qui ne cesse de s’accélérer depuis plusieurs années. La vieillesse entraîne une fragilité et une vulnérabilité qui, elles-mêmes, ont pour conséquence le déclin fonctionnel. L’hospitalisation en milieu de soins aigus chez les aînés est un facteur de risque du déclin fonctionnel qui peut s’observer lors de nouvelles problématiques concernant les activités de la vie quotidienne (AVQ) et les activités instrumentales de la vie quotidienne (AIVQ)

    When Intrusion Detection Meets Blockchain Technology: A Review

    Get PDF
    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many fields, such as supply chain management, international payment, interbanking, and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this paper provides a review regarding the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction

    The Lane hash function

    Get PDF
    We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to be secure, easy to understand, elegant and flexible in implementation

    The CERN Cryogenic Test Facility for the Atlas Barrel Toroid Magnets

    Get PDF
    The superconducting magnet system of the ATLAS detector will consist of a central solenoid, two end-cap toroidal magnets (ECT) and the barrel toroid magnet (BT) made of eight coils symmetrically placed around the central axis of the detector. The magnets will be tested individually in a 5000 m2 experimental area prior to their final installation at an underground cavern of the LHC Collider. For the BT magnets, a dedicated cryogenic test facility has been designed which is currently under the construction and commissioning phase. A liquid nitrogen pre-cooling unit and a 1200 [email protected] refrigerator will allow flexible operating conditions via a rather complex distribution and transfer line system. Flow of two-phase helium for cooling the coils is provided by centrifugal pumps immersed in a saturated liquid helium bath. The integration of the pumps in an existing cryostat required the adoption of novel mechanical solutions. Tests conducted permitted the validation of the technical design of the cryostat and its instrumentation. The characteristics of one pump were measured and pressure rise of 300 mbar at nominal flow of 80 g/s confirmed the specifications

    Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    Get PDF
    Abstract. Side-channel attacks are powerful techniques to attack imple-mentations of cryptographic algorithms by observing its physical param-eters such as power consumption and electromagnetic radiation that are modulated by the secret state. Most side-channel attacks are of divide-and-conquer nature, that is, they yield a ranked list of secret key chunks, e.g., the subkey bytes in AES. The problem of the key recovery is then to find the correct combined key. An optimal key enumeration algorithm (OKEA) was proposed by Charvil-lon et al at SAC’12. Given the ranked key chunks together with their probabilities, this algorithm outputs the full combined keys in the opti-mal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Espe-cially in the cases where the side-channel traces are noisy, the memory and running time requirements to find the right key can be prohibitively high. To tackle this problem, we propose a score-based key enumeration algo-rithm (SKEA). Though it is suboptimal in terms of the output order of cadidate combined keys, SKEA’s memory and running time requirements are more practical than those of OKEA. We verify the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time and memory. We also compare SKEA to the probabilistic key enumera-tion algorithm (PKEA) by Meier and Staffelbach and show its practical superiority in this case. SKEA is efficiently parallelizable. We propose a high-performance solu-tion for the entire conquer stage of side-channel attacks that includes SKEA and the subsequent full key testing, using AES-NI on Haswell Intel CPUs. 2 A. Bogdanov et al

    Cryogenics for CERN experiments: past, present and future

    Get PDF
    Use of cryogenics at CERN was originated (in the 1960s) by bubble chambers and the associated s.c. solenoids. Complex cryoplants were installed to provide cooling at LH2 and LHe temperatures. Continuity (in the 1970s) in He cryogenics for experiments was provided by spectrometer magnets for fixed target physics of the SPS accelerator. More recently (in the 1980s), large "particle-transparent" s.c. solenoids for collider experiments (LEP) have been built demanding new cryoplants. The LHC experiments (in the 2000s) will continue the tradition with s.c. dipoles (ALICE and LHCb), solenoids (CMS, ATLAS) and toroids (ATLAS) of unusual size. Cryogenics for experiments using noble liquids follows the same trend since the development (in the 1970s) of the first shower LAr detectors. A LKr calorimeter (about 10 m3) will be operated in 1996 and the ATLAS experiment foresees a set of three huge LAr calorimeters (almost 90 m3 total volume of liquid) to be installed underground

    Evolution and Nucleosynthesis of Massive Stars and Related Nuclear Uncertainties

    Get PDF
    Properties of atomic nuclei important for the prediction of astrophysical reaction rates are reviewed. In the first part, a recent simulation of evolution and nucleosynthesis of stars between 15 and 25 solar masses is presented. This study is used to illustrate the required nuclear input as well as to give examples of the sensitivity to certain rates. The second part focusses on the prediction of nuclear rates in the statistical model (Hauser-Feshbach) and direct capture (DWBA). Some of the important ingredients are addressed. Discussed in more detail are approaches to predict level densities, parity distributions, and optical alpha+nucleus potentials.Comment: Invited talk at 17th Int. Nucl. Phys. Conf. of the EPS "Nuclear Physics in Astrophysics", Debrecen, Hungary, 2002 (new version: fixed typo in alpha potential parameters; note: the parameters are incorrect in the NPA paper
    corecore