203 research outputs found

    Nombre chromosomique et caryotype de Cistus Ladanifer subsp. Africanus Dansereau (Cistaceae)

    Get PDF
    L’approche caryologique de Cistus ladanifer subsp. africanus Dansereau (Cistaceae) rapportée pour la première fois sur des populations du Maroc, a mis en évidence le nombre et la formule chromosomiques avec 2n = 2x = 18 = 10 m + 4 sm + 4 st ; l’existence d’un phénomène d’endomitose fréquent et la présence à la fois de cellules à chromosomes en croix et de cellules à chromosomes normaux et ceci dans un même méristème. Aussi, les deux variétés, différentes par leurs sécrétions aromatiques volatiles, ont des caryotypes similaires.The kariological approach of Cistus ladanifer subsp. africanus Dansereau (Cistaceae), reported for the fi rst time on populations of Morocco, highlighted the chromosomal number and formula (2n = 2x =18 = 10 m + 4 sm + 4 st); the existence of frequent endomitosis phenomenon’s. We have also noticed that in the same root we can fi nd two different shapes of chromosome: normal and in cross ones. Moreover, the two varieties which differ from their volatile aromatic secretions have the same karyotype

    A survey of IoT security based on a layered architecture of sensing and data analysis

    Get PDF
    The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond

    Optimization of NPK levels of Clementine Sidi Aissa (Citrus reticulata Blanco) trees grafted on different citrus rootstocks

    Get PDF
    Received: August 15th, 2023 ; Accepted: October 18th, 2023 ; Published: November 5th, 2023 ; Correspondence: [email protected] present study aims to investigate the impact of various nitrogen concentrations on young Clementine Sidi Aissa citrus trees (Citrus reticulata Blanco), grafted on five citrus rootstocks namely Moroccan Carrizo citrange, French Carrizo citrange, Troyer citrange, Citrus macrophylla, and sour orange (Citrus aurantium L.). The experiment took place in greenhouses at the Experimental station of El Menzeh INRA-Morocco, with the young trees grown in containers. We applied five different nitrogen treatments (expressed as mg L-1 of N-P2O5-K2O): (0–0–0), (0–25–50), (25–25–50), (50–25–50), and (100–25–50). The split-plot experimental design was used with three replications. The findings demonstrate that the nitrogen enrichment resulted in enhanced plant growth, marked by increased plant height, rootstock and scion stem diameters, diameter and shoot length, relative water content (RWC), as well as leaf chlorophyll and proline content. Optimal growth of the Clementine Sidi Aissa trees was observed under the 100–25–50 (mg L-1 of N-P2O5-K2O) treatment. The study also found that leaf nitrogen concentration increased in line with the quantity of nitrogen added, whereas the percentages of phosphorous and potassium in the leaves decreased. The most significant growth increase across the majority of the studied parameters was noted in Clementine Sidi Aissa trees grafted on Moroccan Carrizo citrange and Troyer citrange rootstocks

    Analyzing Risk Factors for Brain Damages in a Group of Newborns with High Risk of Neurodevelopmental Sequelae: A Moroccan Study

    Get PDF
    Abstract The aim of the study is to identify risk factors for occurrence of perinatal brain injury objectified in transfontanellar ultrasound (TFU) in a group of infants with high risk of neurodevelopmental sequelae. It’s a retrospective study, conducted at the neonatal intensive care unit of the Children's Hospital of Rabat, during the period from 1 January to 31 December 2014. Were included newborns hospitalized for a medical condition with intrauterine croissance retardation (ICUR) more than 5 days and have survived. The neurological workup includes TFU made between day 2 and day 5 of life. Data analysis was performed on SPSS 18.0 software. The level of significance was p <0.05.  The percentage of newborns that developed neurological damage to the TFU was 36%. Patients with abnormalities in the TFU had a breakdown time, duration dependence of O2, duration of hospitalization and a higher frequency of nosocomial infections than patients without abnormality. The interest in the prevention of nosocomial infections is to try to shorten the duration of invasive ventilation, favoring fast relay noninvasive ventilation. Keywords: brain injury; newborns; prematurity, neurodevelopmental sequelae, trans-fontanellar ultrasound.

    Towards securing machine learning models against membership inference attacks

    Get PDF
    From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to different security and privacy attacks. Hence, these issues should be addressed while using ML models to preserve the security and privacy of the data used. There is a need to secure ML models, especially in the training phase to preserve the privacy of the training datasets and to minimise the information leakage. In this paper, we present an overview of ML threats and vulnerabilities, and we highlight current progress in the research works proposing defence techniques against ML security and privacy attacks. The relevant background for the different attacks occurring in both the training and testing/inferring phases is introduced before presenting a detailed overview of Membership Inference Attacks (MIA) and the related countermeasures. In this paper, we introduce a countermeasure against membership inference attacks (MIA) on Conventional Neural Networks (CNN) based on dropout and L2 regularization. Through experimental analysis, we demonstrate that this defence technique can mitigate the risks of MIA attacks while ensuring an acceptable accuracy of the model. Indeed, using CNN model training on two datasets CIFAR-10 and CIFAR-100, we empirically verify the ability of our defence strategy to decrease the impact of MIA on our model and we compare results of five different classifiers. Moreover, we present a solution to achieve a trade-off between the performance of the model and the mitigation of MIA attack

    Agriculture, Forestry and Other Land Uses (Chapter 7)

    Get PDF
    The Agriculture, Forestry and Other Land Use (AFOLU) sector encompasses managed ecosystems and offers significant mitigation opportunities while delivering food, wood and other renewable resources as well as biodiversity conservation, provided the sector adapts to climate change. Land-based mitigation measures represent some of the most important options currently available. They can both deliver carbon dioxide removal (CDR) and substitute for fossil fuels, thereby enabling emissions reductions in other sectors. The rapid deployment of AFOLU measures is essential in all pathways staying within the limits of the remaining budget for a 1.5°C target (high confidence). Where carefully and appropriately implemented, AFOLU mitigation measures are uniquely positioned to deliver substantial co-benefits and help address many of the wider challenges associated with land management. If AFOLU measures are deployed badly then, when taken together with the increasing need to produce sufficient food, feed, fuel and wood, they may exacerbate trade-offs with the conservation of habitats, adaptation, biodiversity and other services. At the same time the capacity of the land to support these functions may be threatened by climate change itself (high confidence)

    Tightly-Secure PAK(E)

    Get PDF
    We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today’s world

    IL-17A Expression Is Localised to Both Mononuclear and Polymorphonuclear Synovial Cell Infiltrates

    Get PDF
    This study examines the expression of IL-17A-secreting cells within the inflamed synovium and the relationship to in vivo joint hypoxia measurements.IL-17A expression was quantified in synovial tissue (ST), serum and synovial fluid (SF) by immunohistochemistry and MSD-plex assays. IL-6 SF and serum levels were measured by MSD-plex assays. Dual immunofluorescence for IL-17A was quantified in ST CD15+ cells (neutrophils), Tryptase+ (mast cells) and CD4+ (T cells). Synovial tissue oxygen (tpO(2)) levels were measured under direct visualisation at arthroscopy. Synovial infiltration was assessed using immunohistochemistry for cell specific markers. Peripheral blood mononuclear and polymorphonuclear cells were isolated and exposed to normoxic or 3% hypoxic conditions. IL-17A and IL-6 were quantified as above in culture supernatants.IL-17A expression was localised to mononuclear and polymorphonuclear (PMN) cells in inflamed ST. Dual immunoflourescent staining co-localised IL-17A expression with CD15+ neutrophils Tryptase+ mast cells and CD4+T cells. % IL-17A positivity was highest on CD15+ neutrophils, followed by mast cells and then CD4+T-cells. The number of IL-17A-secreting PMN cells significantly correlated with sublining CD68 expression (r = 0.618, p<0.01). IL-17A SF levels correlated with IL-6 SF levels (r = 0.675, p<0.01). Patients categorized according to tp0(2)< or >20 mmHg, showed those with low tp0(2)<20 mmHg had significantly higher IL-17A+ mononuclear cells with no difference observed for PMNs. Exposure of mononuclear and polymorphonuclear cells to 3% hypoxia, significantly induced IL-6 in mononuclear cells, but had no effect on IL-17A expression in mononuclear and polymorphonuclear cells.This study demonstrates IL-17A expression is localised to several immune cell subtypes within the inflamed synovial tissue, further supporting the concept that IL-17A is a key mediator in inflammatory arthritis. The association of hypoxia with Il-17A expression appears to be indirect, probably through hypoxia-induced pro-inflammatory pathways and leukocyte influx within the joint microenvironment
    corecore