147 research outputs found

    Continuous control of ionization wave chaos by spatially derived feedback signals

    Get PDF
    In the positive column of a neon glow discharge, two different types of ionization waves occur simultaneously. The low-dimensional chaos arising from the nonlinear interaction between the two waves is controlled by a continuous feedback technique. The control strategy is derived from the time-delayed autosynchronization method. Two spatially displaced points of observation are used to obtain the control information, using the propagation characteristics of the chaotic wave.Comment: Elsevier-Tex-File, 8 pages, 6 figures, submitted to PL

    A Verified CompCert Front-End for a Memory Model Supporting Pointer Arithmetic and Uninitialised Data

    Get PDF
    International audienceThe CompCert C compiler guarantees that the target program behaves as the source program. Yet, source programs without a defined semantics do not benefit from this guarantee and could therefore be miscompiled. To reduce the possibility of a miscompilation, we propose a novel memory model for CompCert which gives a defined semantics to challenging features such as bitwise pointer arithmetics and access to uninitialised data. We evaluate our memory model both theoretically and experimentally. In our experiments, we identify pervasive low-level C idioms that require the additional expressiveness provided by our memory model. We also show that our memory model provably subsumes the existing CompCert memory model thus cross-validating both semantics. Our memory model relies on the core concepts of symbolic value and normalisa-tion. A symbolic value models a delayed computation and the normalisation turns, when possible, a symbolic value into a genuine value. We show how to tame the expressive power of the normalisation so that the memory model fits the proof framework of CompCert. We also adapt the proofs of correctness of the compiler passes performed by CompCert's front-end, thus demonstrating that our model is well-suited for proving compiler transformations

    Preventing Serialization Vulnerabilities through Transient Field Detection

    Get PDF
    International audienceVerifying Android applications' source code is essential to ensure users' security. Due to its complex architecture, Android has specific attack surfaces which the community has to investigate in order to discover new vulnerabilities and prevent as much as possible malicious exploitations. Communication mechanisms are one of the Android components that should be carefully checked and analyzed to avoid data leakage or code injections. Android software components can communicate together using serialization processes. Developers need thereby to indicate manually the transient keyword whenever an object field should not be part of the serialization. In particular, field values encoding memory addresses can leave severe vulnerabilities inside applications if they are not explicitly declared transient. In this study, we propose a novel methodology for automatically detecting, at compilation time, all missing transient keywords directly from Android applications' source code. Our method is based on taint analysis and its implementation provides developers with a useful tool which they might use to improve their code bases. Furthermore, we evaluate our method on a cryptography library as well as on the Telegram application for real world validation. Our approach is able to retrieve previously found vulnerabilities, and, in addition, we find non-exploitable flows hidden within Telegram's code base

    A national survey of the availability of intensity-modulated radiation therapy and stereotactic radiosurgery in Canada

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The timely and appropriate adoption of new radiation therapy (RT) technologies is a challenge both in terms of providing of optimal patient care and managing health care resources. Relatively little is known regarding the rate at which new RT technologies are adopted in different jurisdictions, and the barriers to implementation of these technologies.</p> <p>Methods</p> <p>Surveys were sent to all radiation oncology department heads in Canada regarding the availability of RT equipment from 2006 to 2010. Data were collected concerning the availability and use of Intensity Modulated Radiation Therapy (IMRT) and stereotactic radiosurgery (SRS), and the obstacles to implementation of these technologies.</p> <p>Results</p> <p>IMRT was available in 37% of responding centers in 2006, increasing to 87% in 2010. In 2010, 72% of centers reported that IMRT was available for all patients who might benefit, and 37% indicated that they used IMRT for "virtually all" head and neck patients. SRS availability increased from 26% in 2006 to 42.5% in 2010. Eighty-two percent of centers reported that patients had access to SRS either directly or by referral. The main barriers for IMRT implementation included the need to train or hire treatment planning staff, whereas barriers to SRS implementation mostly included the need to purchase and/or upgrade existing planning software and equipment.</p> <p>Conclusions</p> <p>The survey showed a growing adoption of IMRT and SRS in Canada, although the latter was available in less than half of responding centers. Barriers to implementation differed for IMRT compared to SRS. Enhancing human resources is an important consideration in the implementation of new RT technologies, due to the multidisciplinary nature of the planning and treatment process.</p

    DaViz: Visualization for Android Malware Datasets

    Get PDF
    National audienceWith millions of Android malware samples available, researchers have a large amount of data to perform malware detection and classification, specially with the help of machine learning. Thus far, visualization tools focus on single samples or one-to-many comparison, but not a many-to-many approach. In order to exploit the quantity of data from various datasets to obtain meaningful information, we propose DaViz, a visualization tool for Android malware datasets. With the aid of multiple chart types and interactive sample filtering, users can explore different application datasets and compare them. This new tool allows to get a better understanding of the datasets at hand, and help to continue research by narrowing the samples to those of interest based on selected characteristics

    Humans and Insects Decide in Similar Ways

    Get PDF
    Behavioral ecologists assume that animals use a motivational mechanism for decisions such as action selection and time allocation, allowing the maximization of their fitness. They consider both the proximate and ultimate causes of behavior in order to understand this type of decision-making in animals. Experimental psychologists and neuroeconomists also study how agents make decisions but they consider the proximate causes of the behavior. In the case of patch-leaving, motivation-based decision-making remains simple speculation. In contrast to other animals, human beings can assess and evaluate their own motivation by an introspection process. It is then possible to study the declared motivation of humans during decision-making and discuss the mechanism used as well as its evolutionary significance. In this study, we combine both the proximate and ultimate causes of behavior for a better understanding of the human decision-making process. We show for the first time ever that human subjects use a motivational mechanism similar to small insects such as parasitoids [1] and bumblebees [2] to decide when to leave a patch. This result is relevant for behavioral ecologists as it supports the biological realism of this mechanism. Humans seem to use a motivational mechanism of decision making known to be adaptive to a heterogeneously distributed resource. As hypothesized by Hutchinson et al. [3] and Wilke and Todd [4], our results are consistent with the evolutionary shaping of decision making because hominoids were hunters and gatherers on food patches for more than two million years. We discuss the plausibility of a neural basis for the motivation mechanism highlighted here, bridging the gap between behavioral ecology and neuroeconomy. Thus, both the motivational mechanism observed here and the neuroeconomy findings are most likely adaptations that were selected for during ancestral times

    Human Muscle Satellite Cells as Targets of Chikungunya Virus Infection

    Get PDF
    BACKGROUND: Chikungunya (CHIK) virus is a mosquito-transmitted alphavirus that causes in humans an acute infection characterised by fever, polyarthralgia, head-ache, and myalgia. Since 2005, the emergence of CHIK virus was associated with an unprecedented magnitude outbreak of CHIK disease in the Indian Ocean. Clinically, this outbreak was characterized by invalidating poly-arthralgia, with myalgia being reported in 97.7% of cases. Since the cellular targets of CHIK virus in humans are unknown, we studied the pathogenic events and targets of CHIK infection in skeletal muscle. METHODOLOGY/PRINCIPAL FINDINGS: Immunohistology on muscle biopsies from two CHIK virus-infected patients with myositic syndrome showed that viral antigens were found exclusively inside skeletal muscle progenitor cells (designed as satelllite cells), and not in muscle fibers. To evaluate the ability of CHIK virus to replicate in human satellite cells, we assessed virus infection on primary human muscle cells; viral growth was observed in CHIK virus-infected satellite cells with a cytopathic effect, whereas myotubes were essentially refractory to infection. CONCLUSIONS/SIGNIFICANCE: This report provides new insights into CHIK virus pathogenesis, since it is the first to identify a cellular target of CHIK virus in humans and to report a selective infection of muscle satellite cells by a viral agent in humans

    Quantum dots in axillary lymph node mapping: Biodistribution study in healthy mice

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Breast cancer is the first cause of cancer death among women and its incidence doubled in the last two decades. Several approaches for the treatment of these cancers have been developed. The axillary lymph node dissection (ALND) leads to numerous morbidity complications and is now advantageously replaced by the dissection and the biopsy of the sentinel lymph node. Although this approach has strong advantages, it has its own limitations which are manipulation of radioactive products and possible anaphylactic reactions to the dye. As recently proposed, these limitations could in principle be by-passed if semiconductor nanoparticles (quantum dots or QDs) were used as fluorescent contrast agents for the <it>in vivo </it>imaging of SLN. QDs are fluorescent nanoparticles with unique optical properties like strong resistance to photobleaching, size dependent emission wavelength, large molar extinction coefficient, and good quantum yield.</p> <p>Methods</p> <p>CdSe/ZnS core/shell QDs emitting around 655 nm were used in our studies. 20 μL of 1 μM (20 pmol) QDs solution were injected subcutaneously in the anterior paw of healthy nude mice and the axillary lymph node (ALN) was identified visually after injection of a blue dye. <it>In vivo </it>fluorescence spectroscopy was performed on ALN before the mice were sacrificed at 5, 15, 30, 60 min and 24 h after QDs injection. ALN and all other organs were removed, cryosectioned and observed in fluorescence microscopy. The organs were then chemically made soluble to extract QDs. Plasmatic, urinary and fecal fluorescence levels were measured.</p> <p>Results</p> <p>QDs were detected in ALN as soon as 5 min and up to 24 h after the injection. The maximum amount of QDs in the ALN was detected 60 min after the injection and corresponds to 2.42% of the injected dose. Most of the injected QDs remained at the injection site. No QDs were detected in other tissues, plasma, urine and feces.</p> <p>Conclusion</p> <p>Effective and rapid (few minutes) detection of sentinel lymph node using fluorescent imaging of quantum dots was demonstrated. This work was done using very low doses of injected QDs and the detection was done using a minimally invasive method.</p

    Disease Progression in MRL/lpr Lupus-Prone Mice Is Reduced by NCS 613, a Specific Cyclic Nucleotide Phosphodiesterase Type 4 (PDE4) Inhibitor

    Get PDF
    Systemic lupus erythematosus is a polymorphic and multigenic inflammatory autoimmune disease. Cyclic AMP (cAMP) modulates inflammation and the inhibition of cyclic nucleotide phosphodiesterase type 4 (PDE4), which specifically hydrolyzes cAMP, inhibits TNFα secretion. This study was aimed at investigating the evolution of PDE activity and expression levels during the course of the disease in MRL/lpr lupus-prone mice, and to evaluate in these mice the biological and clinical effects of treatments with pentoxifylline, denbufylline and NCS 613 PDE inhibitors. This study reveals that compared to CBA/J control mice, kidney PDE4 activity of MRL/lpr mice increases with the disease progression. Furthermore, it showed that the most potent and selective PDE4 inhibitor NCS 613 is also the most effective molecule in decreasing proteinuria and increasing survival rate of MRL/lpr mice. NCS 613 is a potent inhibitor, which is more selective for the PDE4C subtype (IC50 = 1.4 nM) than the other subtypes (PDE4A, IC50 = 44 nM; PDE4B, IC50 = 48 nM; and PDE4D, IC50 = 14 nM). Interestingly, its affinity for the High Affinity Rolipram Binding Site is relatively low (Ki = 148 nM) in comparison to rolipram (Ki = 3 nM). Finally, as also observed using MRL/lpr peripheral blood lymphocytes (PBLs), NCS 613 inhibits basal and LPS-induced TNFα secretion from PBLs of lupus patients, suggesting a therapeutic potential of NCS 613 in systemic lupus. This study reveals that PDE4 represent a potential therapeutic target in lupus disease

    Lrp5 Is Not Required for the Proliferative Response of Osteoblasts to Strain but Regulates Proliferation and Apoptosis in a Cell Autonomous Manner

    Get PDF
    Although Lrp5 is known to be an important contributor to the mechanisms regulating bone mass, its precise role remains unclear. The aim of this study was to establish whether mutations in Lrp5 are associated with differences in the growth and/or apoptosis of osteoblast-like cells and their proliferative response to mechanical strain in vitro. Primary osteoblast-like cells were derived from cortical bone of adult mice lacking functional Lrp5 (Lrp5−/−), those heterozygous for the human G171V High Bone Mass (HBM) mutation (LRP5G171V) and their WT littermates (WTLrp5, WTHBM). Osteoblast proliferation over time was significantly higher in cultures of cells from LRP5G171V mice compared to their WTHBM littermates, and lower in Lrp5−/− cells. Cells from female LRP5G171V mice grew more rapidly than those from males, whereas cells from female Lrp5−/− mice grew more slowly than those from males. Apoptosis induced by serum withdrawal was significantly higher in cultures from Lrp5−/− mice than in those from WTHBM or LRP5G171V mice. Exposure to a single short period of dynamic mechanical strain was associated with a significant increase in cell number but this response was unaffected by genotype which also did not change the ‘threshold’ at which cells responded to strain. In conclusion, the data presented here suggest that Lrp5 loss and gain of function mutations result in cell-autonomous alterations in osteoblast proliferation and apoptosis but do not alter the proliferative response of osteoblasts to mechanical strain in vitro
    corecore