1,497 research outputs found
The Hodge numbers of O'Grady 10 via Ng\^o strings
We determine the Hodge numbers of the hyper-K\"ahler manifold known as
O'Grady 10 by studying some related modular Lagrangian fibrations by means of a
refinement of the Ng\^o Support Theorem.Comment: Revised and final version to appear in Jour. Math. Pur. et App
Quantifying spatial acuity of frequency resolved midair ultrasound vibrotactile stimuli
Spatial acuity is a fundamental property of any sensory system. In the case of the somatosensory system, the two-point discrimination (2PD) test has long been used to investigate tactile spatial resolution. However, the somatosensory system comprises three main mechanoreceptive channels: the slowly adapting channel (SA) responds to steady pressure, the rapidly adapting channel (RA) responds to low-frequency vibration, and the Pacinian channel (PC) responds to high-frequency vibration. The use of mechanical stimuli in the classical 2PD test means that previous studies on tactile acuity have primarily focussed on the pressure-sensitive channel alone, while neglecting other submodalities. Here, we used a novel ultrasound stimulation to systematically investigate the spatial resolution of the two main vibrotactile channels. Contrary to the textbook view of poor spatial resolution for PC-like stimuli, across four experiments we found that high-frequency vibration produced surprisingly good spatial acuity. This effect remained after controlling for interchannel differences in stimulus detectability and perceived intensity. Laser doppler vibrometry experiments confirmed that the acuity of the PC channel was not simply an artifact of the skin's resonance to high-frequency mechanical stimulation. Thus, PC receptors may transmit substantial spatial information, despite their sparse distribution, deep location, and large receptive fields
Traitement par alcoolisation des kystes biliaires. Expérience personnelle sur 13 cases
But de l’étude: Evaluer si l’alcoolisation percutanée, technique
introduite depuis une dizaine d’années dans le traitement palliatif
du carcinome hépatocellulaire inopérable, peut être utilisée à titre
curatif dans les kystes biliaires avec de bons résultats, tout en évitant l’intervention chirurgicale.
Matériel et méthodes: Pour l’étude, ont été observés 13
patientes (M 4; F 9 – age 38-71, moyenne 54 ans) qu’ils étaient
symptomatiques. Tous les 13 malades ont été traités par alcoolisation par voie percutanée sous contrôle échographique.
Résultats: L’amélioration de la technique et l’encadrement des
protocoles permettent aujourd’hui de considérer l’alcoolisation
percutanée comme un bon traitement du patient symptomatique
seule indication Ă ce dernier.
Conclusion: La simplicité d’exécution, le bas coût et le faible
nombre de complications ont fait de l’alcoolisation percutanée le
traitement de choix chez les patients porteurs de kystes biliaires
Modelling the spread of Covid19 in Italy using a revised version of the SIR model
In this paper, we present a model to predict the spread of the Covid-19
epidemic and apply it to the specific case of Italy. We started from a simple
Susceptible, Infected, Recovered (SIR) model and we added the condition that,
after a certain time, the basic reproduction number exponentially decays
in time, as empirically suggested by world data. Using this model, we were able
to reproduce the real behavior of the epidemic with an average error of 5\%.
Moreover, we illustrate possible future scenarios, associated to different
intervals of . This model has been used since the beginning of March 2020,
predicting the Italian peak of the epidemic in April 2020 with about 100.000
detected active cases. The real peak of the epidemic happened on the 20th of
April 2020, with 108.000 active cases. This result shows that the model had
predictive power for the italian case.Comment: The model presented in this paper has been adopted on Covstat.it.
Errata corrige in the abstrac
Adding Support for Automatic Enforcement of Security Policies in NFV Networks
This paper introduces an approach towards automatic enforcement of security policies in
fv networks and dynamic adaptation to network changes.
The approach relies on a refinement model that allows the dynamic transformation of high-level security requirements into configuration settings for the Network Security Functions (NSFs), and optimization models that allow the optimal selection of the NSFs to use.
These models are built on a formalization of the NSF capabilities, which serves to unequivocally describe what NSFs are able to do for security policy enforcement purposes.
The approach proposed is the first step towards a security policy aware NFV management, orchestration, and resource allocation system - a paradigm shift for the management of virtualized networks - and it requires minor changes to the current NFV architecture.
We prove that our approach is feasible, as it has been implemented by extending the OpenMANO framework and validated on several network scenarios.
Furthermore, we prove with performance tests that policy refinement scales well enough to support current and future virtualized networks
Integration of Multiple Simultaneous Stimuli within and between Somatosensory sub-Modalities
Psychological characterisation of the somatosensory system often focusses on minimal units of perception, such as detection, localisation, and magnitude estimation of single events. Research on how multiple simultaneous stimuli are aggregated to create integrated, synthetic experiences is rarer.
This thesis aims to shed a light on the mechanisms underlying the integration of multiple simultaneous stimuli, within and between different sub-modalities of the somatosensory system.
First, we investigated the ability of healthy individuals to perceive the total intensity of composite somatosensory patterns. We found that the overall intensity of tactile, cold, or warm patterns was systematically overestimated when the multiple simultaneous stimuli had different intensities. Perception of somatosensory totals was biased towards the most salient element in the pattern. Furthermore, we demonstrated that peak-biased aggregation is a genuine perceptual phenomenon which does not rely on the discrimination of the parts, but is rather based on the salience of each stimulus.
Next, we studied a classical thermal illusion to assess participants’ ability to localise thermal stimuli delivered on the fingers either in isolation, or in uniform and non-uniform patterns. We found that despite a surprisingly high accuracy in reporting the location of a single stimulus, when participants were presented with non-uniform patterns, their ability to identify the thermal state of a specific finger was completely abolished.
Lastly, we investigated the perceptual and neural correlates of thermo-nociceptive interaction during the presentation of multiple thermal stimuli. We found that inhibition of pain by warmth was independent from both the position and the number of thermal stimuli administered.
Our results suggest that nonlinear integration of multiple stimuli, within and between somatosensory sub-modalities, may be an efficient way by which the somatosensory system synthesises the complexity of reality, providing an extended and coherent perception of the world, in spite of its deep bandwidth limitations
On the impossibility of effectively using likely-invariants for software attestation purposes
Invariants monitoring is a software attestation technique that aims at proving the integrity of a running application by checking likely-invariants, which are statistically significant predicates inferred on variables’ values. Being very promising, according to the software protection literature, we developed a technique to remotely monitor invariants. This paper presents the analysis we have performed to assess the effectiveness of our technique and the effectiveness of likely-invariants for software attestation purposes. Moreover, it illustrates the identified limitations and our studies to improve the detection abilities of this technique. Our results suggest that, despite further studies and future results may increase the efficacy and reduce the side effects, software attestation based on likely-invariants is not yet ready for the real world. Software developers should be warned of these limitations, if they could be tempted by adopting this technique, and companies developing software protections should not invest in development without also investing in further research
Towards Automatic Risk Analysis and Mitigation of Software Applications
This paper proposes a novel semi-automatic risk analysis approach that not only identifies the threats against the assets in a software application, but it is also able to quantify their risks and to suggests the software protections to mitigate them. Built on a formal model of the software, attacks, protections and their relationships, our implementation has shown promising performance on real world applications. This work represents a first step towards a user-friendly expert system for the protection of software applications
- …