561 research outputs found

    Sviluppo di un modello di wind shear a diversi livelli di intensita' ed integrazione dello stesso nell'ambito degli effetti atmosferici agenti in un simulatore di volo

    Get PDF
    Il presente lavoro tratta lo sviluppo di un modello di wind shear e la relativa integrazione in un programma di simulazione di volo in tempo reale con lo scopo di riprodurre, attraverso la simulazione, adeguati segnali di riconoscimento del fenomeno e permettere al pilota di effettuare le opportune manovre di recupero oppure di evasione. Utilizzando i risultati di un'indagine FAA, riguardante la caratterizzazione delle condizioni meteorologiche in presenza di wind shear associate a gravi incidenti occorsi in fase di avvicinamento, sono individuati e sviluppati cinque livelli del segnale di perturbazione che si differenziano per intensità e variazione spaziale. Il fenomeno è modellato e codificato in ambiente UNIX® con linguaggio FORTRAN 77. Allo stato attuale non è presente un modello di wind shear validato, quindi allo sviluppo del software segue una verifica della coerenza della risposta del velivolo alle perturbazioni introdotte. Il modello è messo a punto utilizzando la simulazione in tempo reale in collaborazione con piloti collaudatori, alla responsabili della validazione finale. Le tracce temporali dei controlli introdotti dall'equipaggio di condotta nel piano longitudinale e laterodirezionale testimoniano la generazione del carico di lavoro sul pilota. Secondo il pilota collaudatore il carico di lavoro, durante la fase di avvicinamento ed atterraggio, è coerente con quello prodotto dal fenomeno reale ed adeguato, quindi, per scopi di addestramento al pilotaggio; relativamente alla fase di decollo, attualmente il fenomeno non è riconoscibile e per questo non è ritenuto rappresentativo. In futuro, si ritiene necessario effettuare uno studio più approfondito atto a caratterizzare meglio il fenomeno in fase di decollo, seguito da un'intensa campagna di prove in tempo reale per riprodurre, il più fedelmente possibile, la risposta del velivolo alle perturbazioni introdotte ed il corrispondente carico di lavoro del pilota

    Robot-assisted pancreaticoduodenectomy. Safety and feasibility

    Get PDF
    Background: The availability of robotic assistance could make laparoscopic pancreaticoduo- denectomy safely feasible. We herein provide a systematic review on laparoscopic robot-assisted pancreaticoduodenectomy (RAPD). Methods: Literature search was conducted on multiple databases considering articles published in English up to October 31, 2014, reporting on ten or more patients. Results: A total of 262 articles were identified. Excluding duplicates (n=172), studies not matching inclusion criteria (n=77), and studies not suitable for other reasons (n=6), a total of seven studies reporting on 312 RAPDs were eventually reviewed. These studies were either retrospective cohort studies (n=4) or case-matched studies (n=3). No randomized controlled trial was identified. Most patients undergoing RAPD were diagnosed with malignant tumors (224/312; 71.8%). RAPD was feasible in most patients. Conversion to open surgery was reported in 9.2% of the patients. A hybrid RAPD technique, employing standard laparoscopy or open surgery through a mini-incision, was adopted in most patients (178/312; 57.0%). Overall, there were six postoperative deaths at 30 days (6/312; 1.9%), including one intraoperative death caused by portal vein injury, while 137 out of 260 patients with complete information developed postoperative complications (52.7%). The mean length of hospital stay ranged from 10–29 days. Postoperative pancreatic fistula (POPF) occurred in 66 patients (66/312; 21.1%). Grade C POPF was reported in eight patients (8/312; 2.5%). The costs of RAPD were assessed in two studies, demonstrating additional costs ranging from 4,000–5,000 US dollars to 6,193 Euro. The mean number of examined lymph nodes and the rate of positive surgical margins indicate that RAPD could be an appropriate oncologic operation. Conclusion: RAPD is safely feasible. These results were obtained in selected patients and in specialized centers. RAPD should not be implemented in the occasional patient by surgeons without advanced laparoscopic skills and formal training in robotic surgery

    Digitally Immigrant Social Work Faculty: Technology Self-Efficacy and Practice Outcomes

    Get PDF
    The problem addressed in this study was the lack of a model for technology integration in social work education to meet the needs of graduate social workers in the field. Extant research has focused on the efficacy of online or blended learning, but not on social work educators\u27 technology literacy. The purpose of this study was to explore social work educators\u27 self efficacy related to technology use in curriculum and pedagogy. Digitally immigrant educators, defined as those over the age of 35, were studied since this group struggles in adjustment to technology, commonly used by younger students. The conceptual framework synthesized von Bertalanffy\u27s general systems theory and Bandura\u27s self-efficacy construct to understand the relationship between social work educators and technology. In this concurrent mixed methods and grounded theory study, participants (n = 396) provided quantitative responses about self-efficacy to the Computer Technology Integration Survey and answered additional questions about technology integration in the classroom. Findings from the correlational analysis revealed a model that connects positive self-efficacy to the number of digital tools used in the classroom, technology integration in pedagogy and curriculum, and teaching the concept of a \u27digital divide.\u27 Qualitative data from open-ended questions (n = 260) and 4 individual interviews were analyzed by thematic content analysis. Findings included issues that inhibit technology integration: personal motivation, time, and lack of institutional support. This study may contribute to positive social change by proposing a technology integration model for social work educators to use as an innovative strategy for preparing future professionals in the practice of social work

    Backdoor Attacks and Defences on Neural Networks

    Get PDF
    openIn recent years, we have seen an explosion of activity in deep learning in both academia and industry. Deep Neural Networks (DNNs) significantly outperform previous machine learning techniques in various domains, e.g., image recognition, speech processing, and translation. However, the safety of DNNs has now been recognized as a realistic security concern. The basic concept of a backdoor attack is to hide a secret functionality in a system, in our case, a DNN. The system behaves as expected for most inputs, but malicious input activates the backdoor. Deep learning models can be trained and provided by third parties or outsourced to the cloud. The reason behind this practice is that the computational power required to train reliable models is not always available to engineers or small companies. Apart from outsourcing the training phase, another strategy used is transfer learning. In this case, an existing model is fine-tuned for a new task. These scenarios allow adversaries to manipulate model training to create backdoors. The thesis investigates different aspects of the broad scenario of backdoor attacks in DNNs. We present a new type of trigger that can be used in audio signals obtained using the echo. Smaller echoes (less than 1 ms) are not even audible to humans, but they can still be used as a trigger for command recognition systems. We showed that with this trigger, we could bypass STRIP-ViTA, a popular defence mechanism against backdoors. We also analyzed the neuron activations in backdoor models and designed a possible defence based on empirical observations. The neurons of the last layer of a DNN show high variance in their activations when the input samples contain the trigger. Finally, we analyzed and evaluated the blind backdoor attacks, which are backdoor attacks that are based on both code and data poisoning, and tested them with an untested defence. We also proposed a way to bypass the defence.In recent years, we have seen an explosion of activity in deep learning in both academia and industry. Deep Neural Networks (DNNs) significantly outperform previous machine learning techniques in various domains, e.g., image recognition, speech processing, and translation. However, the safety of DNNs has now been recognized as a realistic security concern. The basic concept of a backdoor attack is to hide a secret functionality in a system, in our case, a DNN. The system behaves as expected for most inputs, but malicious input activates the backdoor. Deep learning models can be trained and provided by third parties or outsourced to the cloud. The reason behind this practice is that the computational power required to train reliable models is not always available to engineers or small companies. Apart from outsourcing the training phase, another strategy used is transfer learning. In this case, an existing model is fine-tuned for a new task. These scenarios allow adversaries to manipulate model training to create backdoors. The thesis investigates different aspects of the broad scenario of backdoor attacks in DNNs. We present a new type of trigger that can be used in audio signals obtained using the echo. Smaller echoes (less than 1 ms) are not even audible to humans, but they can still be used as a trigger for command recognition systems. We showed that with this trigger, we could bypass STRIP-ViTA, a popular defence mechanism against backdoors. We also analyzed the neuron activations in backdoor models and designed a possible defence based on empirical observations. The neurons of the last layer of a DNN show high variance in their activations when the input samples contain the trigger. Finally, we analyzed and evaluated the blind backdoor attacks, which are backdoor attacks that are based on both code and data poisoning, and tested them with an untested defence. We also proposed a way to bypass the defence

    Exploring the Complex Interplay between Myeloid-Derived Suppressor Cells (MDSCs), Interleukins, and Immune Checkpoint Inhibitors (ICIs) in Non-Small Cell Lung Cancer (NSCLC)

    Get PDF
    In the era of immunotherapy, exploring the interplay between immune checkpoint inhibitor (ICI) therapy and myeloid-derived suppressor cells (MDSCs), as well as Interleukins, in non-small cell lung cancer (NSCLC) appears intriguing. The first prospective part of this thesis investigates the impact of ICI therapy on the immunological landscape and the expression of cellular FLICE (FADD-like interleukin-1β-converting enzyme)-inhibitory protein (c-FLIP) in MDSCs. Thirtyfour NSCLC patients were longitudinally analyzed, revealing a reduction in proinflammatory cytokines exclusively in non-progressors (NP) after ICI treatment. Through advanced analysis techniques, a distinctive decrease in c-FLIP expression in monocytic (M)-MDSCs from NP patients was identified, suggesting a potential role of ICI therapy in mitigating systemic inflammation and impairing MDSC-dependent immunosuppression. The second study, a comprehensive meta-analysis, focuses on the prognostic role of IL-8 in lung cancer in patients undergoing different treatment approaches (immunotherapy, chemotherapy, surgery, or tyrosine kinase inhibitors). Thirteen studies encompassing different lung cancer stages were included in the analysis. High levels of IL-8 were associated with a significantly shorter overall survival (OS) in patients, particularly those treated with immunotherapy. Moreover, through OS analysis using RNA-seq data from The Cancer Genome Atlas (TCGA), the high expression of IL8 in patients with lung cancer was associated with worse OS than patients with low IL8 expression. By merging the insights from these two analyses, this thesis provides a comprehensive understanding of the intricate relationship between ICI therapy, the immunological landscape, and the prognostic impact of IL-8 in NSCLC. The findings suggest that ICI therapy can modulate the immune response, reducing systemic inflammation and impairing MDSC-dependent immunosuppression. Moreover, the meta-analysis underscores the negative prognostic impact of high IL-8 levels, particularly in patients treated with immunotherapy, highlighting the potential clinical implications of these findings in the management of lung cancer

    Environmental safeguard and sustainable development : an insight into payments for ecosystem services

    Get PDF
    This paper present a thorough reflection on Payments for Ecosystem Services (PES) programs, which may be viewed as the most innovative tools of the ‘environmental policy toolkit’. These are incentive-based mechanisms, compensating landowners to manage the natural resources under their control in a sustainable way (generating environmental services such as biodiversity protection and ecotourism), instead of clearing land or excessively exploiting their natural resources. After briefly discussing the most significant findings in the environment and development research stream, we will present how the roots of PES lie in public economic theory, with regard in particular to environmental externalities. Later, after debating the proper definition of PES and its main concepts (e.g. additionality, perverse incentives, conditionality), we shall also comment the main case-studies on the topic, in order to provide clear examples of how these instruments may be applied in several different context (i.e. both in developing and developed countries, either by public or private agents). As it shall be shown, given their high adaptability to local conditions, PES are likely to become extremely important in next decades’ environment safeguard interventions.O texto contém uma reflexão sobre os Pagamentos por Serviços Ambientais (PSA), que podem ser considerados os instrumentos mais inovadores no âmbito das políticas ambientais. Estas compensações consistem na transferência de recursos (monetários ou outros) a quem ajuda a manter ou a produzir os serviços ambientais (por exemplo, proteção da biodiversidade e ecoturismo) numa maneira sustentável. Os mais importantes progressos na área de investigação sobre o ambiente e o desenvolvimento sustentável são discutidos em breve. Depois, com uma atenção particular às ligações com as teorias de economia pública, o presente artigo pretende analisar de que forma os programas PSA relacionam-se com os estudos sobre as externalidades ambientais. Ademais, as características principais dos PSA são descritas atentamente; são fornecidos também como exemplos explicativos os casos de maior sucesso, ilustrando como PSA podem ser estabelecidos em contextos muito diferentes (em países desenvolvidos e em desenvolvimento, por agentes públicos e privados). Enfim, será demonstrado como, apesar das suas complexidades e das longas investigações necessárias, os PSA podem tornar-se fundamentais pela proteção do meio-ambiente nos próximos anos

    Evolución costera de la desembocadura del Guadalquivir en los últimos 6000 años (SW de España)

    Get PDF
    3 páginas, 2 figuras, 5 referencias.Since the last Holocene sea level rise, about 6,900 yr BP, a series of depositional littoral landforms has been generated at the outlet of the Guadalquivir river, with progradation along the predominant longshore drift (towards the east). The littoral spit systems mapped constitute fur progradation phases. The first is dated between the Flandrian maximum (6,900 yr BP) and 4,500 yr BP; the second between 4,200-3,900 yr BP and 2,700-2,600 yr BP; the third between 2,300 yr BP and 1,100 yr BP; and the fourth between 1,000 yr BP and the present. There were separations of successive erosional phases between 4,500-4,200 yr BP, 2,600-2,300 yr BP and, 1,100-1,000 yr BP. Thus, cycles of higher sedimentation are established, with a slight fall and then stability of sea level. Littoral barrier constructions dominate, with the genesis of extensive tidal flats that decrease the size of the estuaries. These sedimentary phases are interrupted by rapid rises in sea level lasting from 100 to 300 years, when the previously constructed littoral barriers are eroded. The cliffs retreat, causing migration inland of dunar constructions, with frequent overlapping layers. Marine influence within the estuaries in creases.Este trabajo ha sido subvencionado por los proyectos coordinados de la DGICYT PB91-0622-C03-0 1 y PB94-1090-C03-0l. Es una contribución al IGCP-367.Peer reviewe

    Verification of delayed-reset domino circuits using ATACS

    Get PDF
    Journal ArticleThis paper discusses the application of the timing analysis tool ATACS to the high performance, self-resetting and delayed-reset domino circuits being designed at IBM's Austin Research Laboratory. The tool, which was originally developed to deal with asynchronous circuits, is well suited to the self-resetting style since internally, a block of selfresetting or delayed-reset domino logic is asynchronous. The circuits are represented using timed event/level structures. These structures correspond very directly to gate level circuits, making the translation from a transistor schematic to a TEL structure straightforward. The statespace explosion problem is mitigated using an algorithm based on partially ordered sets (POSETs). Results on a number of circuits from the recently published guTS (gigahertz unit Test Site) processor from IBM indicate that modules of significant size can be verified with ATACS using a level of abstraction that preserves the interesting timing properties of the circuit. Accurate circuit level verification allows the designer to include less margin in the design, which can lead to increased performance

    Timed circuits: a new paradigm for high-speed design

    Get PDF
    Journal ArticleAbstract| In order to continue to produce circuits of increasing speeds, designers must consider aggressive circuit design styles such as self-resetting or delayed-reset domino circuits used in IBM's gigahertz processor (GUTS) and asynchronous circuits used in Intel's RAPPID instruction length decoder. These new timed circuit styles, however, cannot be efficiently and accurately analyzed using traditional static timing analysis methods. This lack of efficient analysis tools is one of the reasons for the lack of mainstream acceptance of these design styles. This paper discusses several industrial timed circuits and gives an overview of our timed circuit design methodology
    corecore