5,484 Research products, page 1 of 549
Loading
- Publication . Part of book or chapter of book . Conference object . Other literature type . Article . 2016Open Access EnglishAuthors:Florent Berthaut; Luke Dahl;Florent Berthaut; Luke Dahl;Publisher: HAL CCSDCountry: FranceProject: EC | IXMI (330770)
International audience; Orchestras of Digital Musical Instruments (DMIs) enable new musical collaboration possibilities, extending those of acoustic and electric orchestras. However the creation and development of these orchestras remain constrained. In fact, each new musical collaboration system or orchestra piece relies on a fixed number of musicians, a fixed set of instruments (often only one), and a fixed subset of possible modes of collaboration. In this paper, we describe a unified framework that enables the design of Digital Orchestras with potentially different DMIs and an expand-able set of collaboration modes. It relies on research done on analysis and classification of traditional and digital orchestras, on research in Collaborative Virtual Environments, and on interviews of musicians and composers. The BOEUF framework consists of a classification of modes of collaboration and a set of components for modelling digital orchestras. Integrating this framework into DMIs will enable advanced musical collaboration modes to be used in any digital orchestra, including spontaneous jam sessions.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2018Closed AccessAuthors:Thierry Billard; François Liger; Mathieu Verdurand;Thierry Billard; François Liger; Mathieu Verdurand;Publisher: ElsevierCountry: France
Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Conference object . 2019Open AccessAuthors:Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Countries: United Kingdom, FranceProject: EC | VisIoN (764461)
International audience; In this paper, we study the effect of smartphone camera exposure on the performance of optical camera communications (OCC) link. The exposure parameters of image sensor sensitivity (ISO), aperture and shutter speed are included. A static OCC link with a 8 × 8 red, green and blue (RGB) LED array employed as the transmitter and a smartphone camera as the receiver is demonstrated to verify the study. Signal-to-noise ratio (SNR) analysis at different ISO values, the effect of aperture and shutter speed on communication link quality is performed. While SNRs of 20.6 dB and 16.9 dB are measured at 1 m and 2 m transmission distance, respectively for a ISO value of 100, they are decreased to 17.4 dB and 13.32 dB for a ISO of 800. The bit error rate (BER) of a 1 m long OCC link with a camera's shutter speed of 1/6000 s is 1.3 × 10 −3 (i.e., below the forward error correction BER limit of 3.8 × 10 −3) and is dropped to 0.0125 at a shutter speed of 1/20 s. This study provides insight of the basic smartphone settings and the exposure adjustment for further complex OCC links.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Part of book or chapter of book . 2020Open Access EnglishAuthors:Hassen Nigatu; Yimesker Yihun;Hassen Nigatu; Yimesker Yihun;Publisher: HAL CCSDCountry: France
International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Part of book or chapter of book . Conference object . 2019Closed AccessAuthors:Aishatu Shuaibu; Salihu Ibrahim Dasuki; Muhammadou M. O. Kah;Aishatu Shuaibu; Salihu Ibrahim Dasuki; Muhammadou M. O. Kah;Publisher: Springer International Publishing
Part 1: Communities, ICT-Enabled Networks, and Development; International audience; This study is aimed at understanding the implementation of Information Communication Technology (ICT) tool to electoral process and its challenges in Nigeria using actor-network theory (ANT) as a lens. Moment of translation of ANT was applied to gain an insight of the phenomenon. Empirical data was used for the analysis in the context of social behavior between human and non-human actors following inductive research approach. Case study methodology was carried out at Independent National Electoral Commission (INEC). The methods of data collection were through interview, participant observation and reviewing organizational documents. Challenges of the Smart Card Reader (SCR) in Nigeria’s electoral process are highlighted. Results of the study indicated that the challenges in implementation of the SCR emanated from the heterogeneous actors “human and non-human”, which lack synchrony during the process. Apart from the success of the card reader during accreditation, there was inadequate manpower training by INEC body and insufficient ICT infrastructure that weakened the ANT process.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2014EnglishAuthors:Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;Publisher: HAL CCSDCountry: France
Increases in arterial stiffness and pulse pressure are typical features of the arterial stiffness during aging and are associated with increased risk of cardiovascular complications. Cellular and molecular determinants of arterial stiffness have not been completely elucidated. Clinically, the carotid-femoral pulse wave velocity (PWV) is the gold standard parameter of arterial stiffness. A recent genome-wide scan of the Framingham Heart Study population has shown that arterial stiffness and mean and pulsatile components of blood pressure are heritable and map to separate the genetic loci in humans, suggesting that distinct genes may modulate these two phenotypes. This chapter details the recent knowledge on the influence of genetic determinants and telomere length on the development of age-related phenotypes. Recent genetic studies have revealed specific genes contributing to arterial stiffening. Available data on genome-wide association (GWA) have been initiated on PWV and have identified common genetic variation in specific loci or single-nucleotide polymorphisms (SNP) significantly associated with PWV. Telomere length at birth is strongly determined genetically and is the main determinant of leukocytes’ telomere length (LTL) later in life. Short LTL is associated with increased risk of stiffness and atherosclerosis of the carotid artery, atherosclerotic heart disease, and diminished survival in the elderly.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2016Open Access EnglishAuthors:Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Publisher: HAL CCSDCountry: France
Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2018Open Access EnglishAuthors:Martin, Adrian; Coolsaet, Brendan; Corbera, Esteve; Dawson, Neil; Fisher, Janet; Franks, Phil; Mertz, Ole; Pascual, Unai; Rasmussen, Laura,; Ryan, Casey;Martin, Adrian; Coolsaet, Brendan; Corbera, Esteve; Dawson, Neil; Fisher, Janet; Franks, Phil; Mertz, Ole; Pascual, Unai; Rasmussen, Laura,; Ryan, Casey;Publisher: HAL CCSDCountries: France, United Kingdom
Land use intensification is widely considered to be an essential strategy for achieving global goals to eliminate poverty and to avoid damaging losses of ecosystem services. This chapter investigates whether current land use intensification activities are achieving these twin goals. To do so, it reviews a body of academic literature that reports on case studies in which both social and ecological outcomes of intensification are reported. There are two main findings. First, there are relatively few cases in which land use intensification is clearly succeeding in these twinned objectives. There are many more cases in which, for example, short-term income or productivity gains from land use intensification are resulting in long-term diminution of biodiversity and ecosystem services. Studies with longer-term perspectives are already seeing how such trade-offs are leading to negative feedbacks for human wellbeing, especially for marginalised social groups. Secondly, we learn most from those studies that a) go beyond measuring production and income to measure multiple dimensions of wellbeing and ecosystem services, b) monitor dynamics of outcomes across longer time periods and across landscapes and c) disaggregate outcome measures to identify outcomes for different social groups.
- Publication . Conference object . Part of book or chapter of book . 2017Open Access EnglishAuthors:Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);
handle: 2078.1/187166
Publisher: SpringerCountries: France, France, BelgiumProject: EC | CRASH (280141), EC | AMAROUT-II (291803)International audience; In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model is not always convenient, e.g. when combined with formal methods for the verification of cryptographic implementations. Therefore we introduce a new model, the bounded moment model, that formalizes a weaker notion of security order frequently used in the side-channel literature. Interestingly , we prove that probing security for a serial implementation implies bounded moment security for its parallel counterpart. This result therefore enables an accurate understanding of the links between formal security analyses of masking schemes and experimental security evaluations based on the estimation of statistical moments Besides its consolidating nature, our work also brings useful technical contributions. First, we describe and analyze refreshing and multiplication algorithms that are well suited for parallel implementations and improve security against multivariate side-channel attacks. Second, we show that simple refreshing algorithms (with linear complexity) that are not secure in the continuous probing model are secure in the continuous bounded moment model. Eventually, we discuss the independent leakage assumption required for masking to deliver its security promises, and its specificities related to the serial or parallel nature of an implementation.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Part of book or chapter of book . 2019Closed Access EnglishAuthors:Romain Quentin; Oluwole Awosika; Leonardo G. Cohen;Romain Quentin; Oluwole Awosika; Leonardo G. Cohen;Publisher: HAL CCSD
Abstract The frontal lobe plays a crucial role in human motor behavior. It is one of the last areas of the brain to mature, especially the prefrontal regions. After a brief historical perspective on the perceived dichotomy between the view of the brain as a static organ and that of a plastic, constantly changing structure, we discuss the stability/plasticity dilemma including examples of documented cortical reorganization taking place at multiple spatial and temporal scales. We pose that while plasticity is needed for motor learning, stability of the system is necessary for storage and maintenance of memorized skills. We discuss how this plasticity/stability dilemma is resolved along the life span and after a brain injury. We then examine the main challenges that clinicians have to overcome to promote recovery of function in patients with brain lesions, including attempts to use neurostimulation techniques as adjuvant to training-based customary neurorehabilitation.
add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.
5,484 Research products, page 1 of 549
Loading
- Publication . Part of book or chapter of book . Conference object . Other literature type . Article . 2016Open Access EnglishAuthors:Florent Berthaut; Luke Dahl;Florent Berthaut; Luke Dahl;Publisher: HAL CCSDCountry: FranceProject: EC | IXMI (330770)
International audience; Orchestras of Digital Musical Instruments (DMIs) enable new musical collaboration possibilities, extending those of acoustic and electric orchestras. However the creation and development of these orchestras remain constrained. In fact, each new musical collaboration system or orchestra piece relies on a fixed number of musicians, a fixed set of instruments (often only one), and a fixed subset of possible modes of collaboration. In this paper, we describe a unified framework that enables the design of Digital Orchestras with potentially different DMIs and an expand-able set of collaboration modes. It relies on research done on analysis and classification of traditional and digital orchestras, on research in Collaborative Virtual Environments, and on interviews of musicians and composers. The BOEUF framework consists of a classification of modes of collaboration and a set of components for modelling digital orchestras. Integrating this framework into DMIs will enable advanced musical collaboration modes to be used in any digital orchestra, including spontaneous jam sessions.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2018Closed AccessAuthors:Thierry Billard; François Liger; Mathieu Verdurand;Thierry Billard; François Liger; Mathieu Verdurand;Publisher: ElsevierCountry: France
Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Conference object . 2019Open AccessAuthors:Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Countries: United Kingdom, FranceProject: EC | VisIoN (764461)
International audience; In this paper, we study the effect of smartphone camera exposure on the performance of optical camera communications (OCC) link. The exposure parameters of image sensor sensitivity (ISO), aperture and shutter speed are included. A static OCC link with a 8 × 8 red, green and blue (RGB) LED array employed as the transmitter and a smartphone camera as the receiver is demonstrated to verify the study. Signal-to-noise ratio (SNR) analysis at different ISO values, the effect of aperture and shutter speed on communication link quality is performed. While SNRs of 20.6 dB and 16.9 dB are measured at 1 m and 2 m transmission distance, respectively for a ISO value of 100, they are decreased to 17.4 dB and 13.32 dB for a ISO of 800. The bit error rate (BER) of a 1 m long OCC link with a camera's shutter speed of 1/6000 s is 1.3 × 10 −3 (i.e., below the forward error correction BER limit of 3.8 × 10 −3) and is dropped to 0.0125 at a shutter speed of 1/20 s. This study provides insight of the basic smartphone settings and the exposure adjustment for further complex OCC links.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Part of book or chapter of book . 2020Open Access EnglishAuthors:Hassen Nigatu; Yimesker Yihun;Hassen Nigatu; Yimesker Yihun;Publisher: HAL CCSDCountry: France
International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Part of book or chapter of book . Conference object . 2019Closed AccessAuthors:Aishatu Shuaibu; Salihu Ibrahim Dasuki; Muhammadou M. O. Kah;Aishatu Shuaibu; Salihu Ibrahim Dasuki; Muhammadou M. O. Kah;Publisher: Springer International Publishing
Part 1: Communities, ICT-Enabled Networks, and Development; International audience; This study is aimed at understanding the implementation of Information Communication Technology (ICT) tool to electoral process and its challenges in Nigeria using actor-network theory (ANT) as a lens. Moment of translation of ANT was applied to gain an insight of the phenomenon. Empirical data was used for the analysis in the context of social behavior between human and non-human actors following inductive research approach. Case study methodology was carried out at Independent National Electoral Commission (INEC). The methods of data collection were through interview, participant observation and reviewing organizational documents. Challenges of the Smart Card Reader (SCR) in Nigeria’s electoral process are highlighted. Results of the study indicated that the challenges in implementation of the SCR emanated from the heterogeneous actors “human and non-human”, which lack synchrony during the process. Apart from the success of the card reader during accreditation, there was inadequate manpower training by INEC body and insufficient ICT infrastructure that weakened the ANT process.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2014EnglishAuthors:Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;Publisher: HAL CCSDCountry: France
Increases in arterial stiffness and pulse pressure are typical features of the arterial stiffness during aging and are associated with increased risk of cardiovascular complications. Cellular and molecular determinants of arterial stiffness have not been completely elucidated. Clinically, the carotid-femoral pulse wave velocity (PWV) is the gold standard parameter of arterial stiffness. A recent genome-wide scan of the Framingham Heart Study population has shown that arterial stiffness and mean and pulsatile components of blood pressure are heritable and map to separate the genetic loci in humans, suggesting that distinct genes may modulate these two phenotypes. This chapter details the recent knowledge on the influence of genetic determinants and telomere length on the development of age-related phenotypes. Recent genetic studies have revealed specific genes contributing to arterial stiffening. Available data on genome-wide association (GWA) have been initiated on PWV and have identified common genetic variation in specific loci or single-nucleotide polymorphisms (SNP) significantly associated with PWV. Telomere length at birth is strongly determined genetically and is the main determinant of leukocytes’ telomere length (LTL) later in life. Short LTL is associated with increased risk of stiffness and atherosclerosis of the carotid artery, atherosclerotic heart disease, and diminished survival in the elderly.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2016Open Access EnglishAuthors:Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Publisher: HAL CCSDCountry: France
Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2018Open Access EnglishAuthors:Martin, Adrian; Coolsaet, Brendan; Corbera, Esteve; Dawson, Neil; Fisher, Janet; Franks, Phil; Mertz, Ole; Pascual, Unai; Rasmussen, Laura,; Ryan, Casey;Martin, Adrian; Coolsaet, Brendan; Corbera, Esteve; Dawson, Neil; Fisher, Janet; Franks, Phil; Mertz, Ole; Pascual, Unai; Rasmussen, Laura,; Ryan, Casey;Publisher: HAL CCSDCountries: France, United Kingdom
Land use intensification is widely considered to be an essential strategy for achieving global goals to eliminate poverty and to avoid damaging losses of ecosystem services. This chapter investigates whether current land use intensification activities are achieving these twin goals. To do so, it reviews a body of academic literature that reports on case studies in which both social and ecological outcomes of intensification are reported. There are two main findings. First, there are relatively few cases in which land use intensification is clearly succeeding in these twinned objectives. There are many more cases in which, for example, short-term income or productivity gains from land use intensification are resulting in long-term diminution of biodiversity and ecosystem services. Studies with longer-term perspectives are already seeing how such trade-offs are leading to negative feedbacks for human wellbeing, especially for marginalised social groups. Secondly, we learn most from those studies that a) go beyond measuring production and income to measure multiple dimensions of wellbeing and ecosystem services, b) monitor dynamics of outcomes across longer time periods and across landscapes and c) disaggregate outcome measures to identify outcomes for different social groups.
- Publication . Conference object . Part of book or chapter of book . 2017Open Access EnglishAuthors:Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);
handle: 2078.1/187166
Publisher: SpringerCountries: France, France, BelgiumProject: EC | CRASH (280141), EC | AMAROUT-II (291803)International audience; In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model is not always convenient, e.g. when combined with formal methods for the verification of cryptographic implementations. Therefore we introduce a new model, the bounded moment model, that formalizes a weaker notion of security order frequently used in the side-channel literature. Interestingly , we prove that probing security for a serial implementation implies bounded moment security for its parallel counterpart. This result therefore enables an accurate understanding of the links between formal security analyses of masking schemes and experimental security evaluations based on the estimation of statistical moments Besides its consolidating nature, our work also brings useful technical contributions. First, we describe and analyze refreshing and multiplication algorithms that are well suited for parallel implementations and improve security against multivariate side-channel attacks. Second, we show that simple refreshing algorithms (with linear complexity) that are not secure in the continuous probing model are secure in the continuous bounded moment model. Eventually, we discuss the independent leakage assumption required for masking to deliver its security promises, and its specificities related to the serial or parallel nature of an implementation.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Part of book or chapter of book . 2019Closed Access EnglishAuthors:Romain Quentin; Oluwole Awosika; Leonardo G. Cohen;Romain Quentin; Oluwole Awosika; Leonardo G. Cohen;Publisher: HAL CCSD
Abstract The frontal lobe plays a crucial role in human motor behavior. It is one of the last areas of the brain to mature, especially the prefrontal regions. After a brief historical perspective on the perceived dichotomy between the view of the brain as a static organ and that of a plastic, constantly changing structure, we discuss the stability/plasticity dilemma including examples of documented cortical reorganization taking place at multiple spatial and temporal scales. We pose that while plasticity is needed for motor learning, stability of the system is necessary for storage and maintenance of memorized skills. We discuss how this plasticity/stability dilemma is resolved along the life span and after a brain injury. We then examine the main challenges that clinicians have to overcome to promote recovery of function in patients with brain lesions, including attempts to use neurostimulation techniques as adjuvant to training-based customary neurorehabilitation.
add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.