• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 93
  • 55
  • 22
  • 15
  • 15
  • 11
  • 9
  • 7
  • 7
  • 6
  • 6
  • 5
  • 4
  • 2
  • 2
  • Tagged with
  • 276
  • 60
  • 42
  • 41
  • 40
  • 32
  • 29
  • 29
  • 27
  • 27
  • 25
  • 23
  • 22
  • 20
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Proposition d'une méthodologie de réingénierie pour le contrôle par le produit de systèmes manufacturiers : application au circuit du médicament d'un hôpital

Huet, Jean-Charles 07 January 2011 (has links) (PDF)
Le circuit du médicament est un élément primordial dans l'organisation des établissements de santé. Sa sécurisation et sa modernisation permettent de baisser sensiblement le nombre de personnes victimes d'erreurs médicamenteuses et de réduire les coûts (augmentation du rendement, libération de poste préparateur et gain de temps infirmière. . .). L'utilisation de la DJIN (Dispensation Journalière Individuelle Nominative), de systèmes de préparation et de transport sécurisés (robots, circuit pneumatique, chariots de dispensation. . .), de systèmes de contrôle de l'administration au lit du patient sont les solutions permettant d'éviter les erreurs humaines. Nous proposons dans cette étude d'utiliser des concepts du milieu industriel pour améliorer la sécurité et la traçabilité du circuit du médicament. Nous utilisons le paradigme de Système Contrôlé par le Produit (SCP) qui propose de mettre le produit au coeur du système en utilisant des nouvelles technologies tel que la RFID. Nous comparons le circuit du médicament avec un système d'assemblage : l'opération d'assemblage est vue comme un ajout de médicaments et le produit comme la préparation de la prescription pour un patient. Le but de cette thèse est de proposer une méthodologie de réingénierie, basée surl e MDA et ASCI, pour le contrôle par le produit en synchronisant les flux physiques et informationnels, puis de l'appliquer au circuit du médicament. Enfin, nous l'instancions au CHU de Clermont-Ferrand en testant différents scénarios à travers un logiciel de simulation afin de proposer une aide à la décision pour les pharmaciens et les responsables du CHU.
142

Evaluation Of Salt Tolerance In Sto Transformed Arabidopsis Thaliana And Nicotiana Tabacum Plants

Selcuk, Feyza 01 January 2004 (has links) (PDF)
Salinity is one of the limiting factors of crop development. Together with causing water loss from plant tissues, salinity also leads to ion toxicity. Under salt stress, increase in Ca+2 concentration in cytosol can decrease the deleterious effects of stress. The binding of Ca+2 to calmodulin initiates a signaling cascade involving the activation of certain transcription factors like STO and STZ. This signal transduction pathway regulates transport of proteins that control net Na+ influx across the plasma membrane and compartmentalization into the vacuole. Previously Arabidopsis STO was identified as a repressor of the yeast calcineurin mutation. Genetical and molecular characterization of STO / a putative transcription factor that takes role in salt stress tolerance can provide a better understanding in the mechanism of salt tolerance and development of resistance in higher plants. The aim of the present study was to amplify and clone the Arabidopsis thaliana sto gene in plant transformation vectors and use them for the transformation of Nicotiana tabacum and Arabidopsis thaliana plants via Agrobacterium tumefaciens mediated gene transfer systems. T0 and T1 progeny of transgenic plants carrying sto were analysed for the stable integration of transgenes, segregetion patterns, expression of the gene and their tolerance to salt stress. The results of the study showed that all transgenic Nicotiana tabacum lines are differentially expressing a transcript that is lacking in control plants and most transgenic lines exhibited higher germination percentages and fresh weights, lower MDA contents under salt stress. On the other hand overexpression of sto in Arabidopsis plants did not provide an advantage to transgenic plants under salt stress, however the anti-sense expression of sto caused decreased germination percentages even under normal conditions. According to the sto expression analysis of wild type Arabidopsis plants, sto was shown to be induced under certain stress conditions like cold and sucrose, whereas it remained constant in salt treatment. External application of plant growth regulators had no clear effect on sto expression, with the exception of slight induction of expression with ABA and ethylene treatments.
143

Softwaretests in der Domäne modellgetriebener BI-Systeme

Krawatzeck, Robert 07 July 2011 (has links) (PDF)
Unternehmen agieren heute in einer hochdynamischen Umwelt, wodurch die Anforderungen an Business Intelligence-Systeme (BI-Systeme) sich stetig verändern. Durch zügiges Reagieren darauf können sich Unternehmen Wettbewerbsvorteile verschaffen. Die dazu notwendige Wandlungsfähigkeit von BI-Systemen setzt voraus, dass bereits die BI-Architektur auf Flexibilität ausgelegt ist. Die Anwendung des Paradigmas der modellgetriebenen Softwareentwicklung auf die Domäne des Data Warehouse Engineerings (DWE) kommt diesem Bedarf nach. Zudem muss neben der Agilität von BI-Systemen auch der Faktor der Korrektheitsprüfung nach vorgenommenen Änderungen betrachtet werden. Es soll untersucht werden, inwieweit sich die im modellgetriebenen DWE anfallenden Metadaten zur Unterstützung und Automatisierung von Softwaretests zur Korrektheitsprüfung nutzen lassen. Die so erzielte Verringerung des Überprüfungsaufwandes führt zu einer verbesserten Wandlungsfähigkeit von BI-Architekturen und kommt somit dem Bedarf von effizienten agilen BI-Lösungen nach.
144

Humour as a postcolonial strategy in Zakes Mda's novel, The heart of redness.

Hagemann, Michael Eric January 2005 (has links)
This thesis sought to demonstrate that humour and the grotesque are the primary tools by which Mda achieve his postcolonial strategies of &quot / writing back&quot / , that is, of asserting an identity in the face of colonial pressures, apartheid and the growing selfishness of many in the new, post-democratic South African society.
145

Flying in the face of convention: "The heart of redness" as rehabilitative of the South African pastoral literary tradition through the frame of universal myth.

Jacobs, Anthony Richard January 2005 (has links)
This thesis analyzed Zakes Mda's The Heart of redness in the tradition of South African pastoral and counter-pastoral. It proposed that the novel is a hybrid of both African and European tradition and perspectives. It adduced Northrop Frye's theory of myth and archetypes in literature as a basis for study. It also analysed the novel in its use of irony.
146

Integrating formal verification into the model-based development of adaptive embedded systems

Schaefer, Ina January 2008 (has links)
Zugl.: Kaiserslautern, Techn. Univ., Diss., 2008
147

South African satire : a study of Zakes Mda's The Madonna of Excelsior

Van Vuuren, Sonja 12 1900 (has links)
Thesis (MA)--University of Stellenbosch, 2004. / ENGLISH ABSTRACT: This thesis analyses Zakes Mda’s The Madonna of Excelsior from three different points of view, namely post-colonial, feminist and satirical. The latter constitutes the main interpretation of the novel and serves as a link with the other two discourses – the key argument being that satire is not a solipsistic form of art, and thus a satirical text should not be considered on its own, but should rather be interpreted in conjunction with other cultural discourses. This thesis is of the opinion that one needs all three of the named viewpoints in order to fully comprehend and appreciate the depth of Mda’s satire and his comments on South African society. His novel contains several candid comments on the political situation of South Africa in both the apartheid and the democratic eras, and his tongue-in-cheek observations force the reader to consider his novel from a political and a satirical angle. As apartheid is a form of colonialism and South Africa carries several scars from colonial times (such as diasporic conditions and multi-cultural identity crises, to name a few of those discussed), this thesis analyses Mda’s political commentary in terms of post-colonial discourse. Due to Mda’s use of female protagonists, this thesis also considers a feminist interpretation as necessary for a better understanding of the novel: through the use of feminist discourse, the violence that is committed against some of the female characters in the novel is interpreted as a way of enforcing colonial power relations. Chapters two, three and four respectively each discuss one of these interpretations: post-colonial, feminist and satirical, whilst chapter one is devoted to defining the art of satire. / AFRIKAANSE OPSOMMING: Hierdie tesis analiseer Zakes Mda se The Madonna of Excelsior vanuit drie verskillende oogpunte, naamlik die postkoloniale, feministiese and satiriese. Laasgenoemde konstitueer die hoofinterpretasie van die teks, en vorm ook ‘n skakel met die ander twee diskoerse. Die hoofargument van die tesis is dat satire nie ‘n kunsvorm is wat alleen bestaan nie, en dus behoort ‘n mens nie ‘n satiriese teks in isolasie te oordink nie, maar so ‘n teks moet geïnterpreteer word in verbinding met ander diskoerse. Hierdie tesis glo dat al drie van die genoemde oogpunte noodsaaklik is om Mda se satiriese kommentaar en aanmerkings oor die Suid-Afrikaanse gemeenskap werklik te verstaan en waardeer. Daar is etlike openhartige aanmerkings in die teks wat die politiese situasie van Suid-Afrika in beide die apartheid en die demokratiese eras aanspreek, en Mda se skertsende kommentaar dwing die leser om die teks te oordink van ‘n politiese, asook ‘n satiriese, gesigspunt. Aangesien apartheid ‘n vorm van kolonialisme is, en Suid-Afrika verskeie littekens van koloniale tye dra (soos disporas en multi-kulturele krisisse, om maar ‘n paar te noem), analiseer hierdie tesis Mda se politiese aanmerkings in terme van ‘n postkoloniale interpretasie. Mda se gebruik van vroulike hoofkarakters veroorsaak dat hierdie tesis ook a feministiese interpretasie benuttig vir ‘n betere begrip van die teks: deur die gebruik van ‘n feministiese diskoers kan ‘n mens die geweld wat teen sommige van die vroulike karakters gepleeg word sien as ‘n manier om koloniale magsverhoudinge af te dwing. Hoofstukke twee, drie en vier bespreek elk een van hierdie oogpunte: postkoloniaal, feminisme en satiere, terwyl hoofstuk een die satiriese kuns probeer definieer.
148

CrossMDA2: Uma abordagem para minimizar o problema da fragilidade de pointcuts na evolu??o de sistemas orientados a aspectos

Fernandes, Victor Hugo de Carvalho 19 August 2009 (has links)
Made available in DSpace on 2014-12-17T15:47:54Z (GMT). No. of bitstreams: 1 VitorHCF_DISSERT.pdf: 1785877 bytes, checksum: f2ffb41b74e619df077cce589a2a45d2 (MD5) Previous issue date: 2009-08-19 / This work proposes a model based approach for pointcut management in the presence of evolution in aspect oriented systems. The proposed approach, called conceptual visions based pointcuts, is motivated by the observation of the shortcomings in traditional approaches pointcuts definition, which generally refer directly to software structure and/or behavior, thereby creating a strong coupling between pointcut definition and the base code. This coupling causes the problem known as pointcut fragility problem and hinders the evolution of aspect-oriented systems. This problem occurs when all the pointcuts of each aspect should be reviewed due to any software changes/evolution, to ensure that they remain valid even after the changes made in the software. Our approach is focused on the pointcuts definition based on a conceptual model, which has definitions of the system's structure in a more abstract level. The conceptual model consists of classifications (called conceptual views) on entities of the business model elements based on common characteristics, and relationships between these views. Thus the pointcuts definitions are created based on the conceptual model rather than directly referencing the base model. Moreover, the conceptual model contains a set of relationships that allows it to be automatically verified if the classifications in the conceptual model remain valid even after a software change. To this end, all the development using the conceptual views based pointcuts approach is supported by a conceptual framework called CrossMDA2 and a development process based on MDA, both also proposed in this work. As proof of concept, we present two versions of a case study, setting up a scenario of evolution that shows how the use of conceptual visions based pointcuts helps detecting and minimizing the pointcuts fragility. For the proposal evaluation the Goal/Question/Metric (GQM) technique is used together with metrics for efficiency analysis in the pointcuts definition / Este trabalho prop?e uma abordagem baseada em modelos para minimizar o problema da fragilidade de pointcuts na evolu??o de sistemas desenvolvidos segundo o paradigma de orienta??o a aspectos. A abordagem proposta, denominada pointcuts baseados em vis?es conceituais, ? motivada pela constata??o das defici?ncias das abordagens tradicionais de defini??o de pointcuts, as quais em geral fazem refer?ncia direta a estrutura e/ou comportamento do software, tendendo assim a criar um acoplamento com o c?digo. Tal acoplamento acarreta o problema denominado problema da fragilidade de pointcuts e dificulta a evolu??o dos sistemas orientados a aspectos. Este problema ocorre quando todos os pointcuts de cada aspecto devem ser revisados, devido a qualquer modifica??o/evolu??o no software, para garantir que eles continuam v?lidos mesmo ap?s as altera??es realizadas no software. Nossa abordagem ? centrada na defini??o de pointcuts com base em um modelo conceitual, que possui defini??es da estrutura do sistema em um n?vel mais abstrato do o modelo de neg?cios. O modelo conceitual consiste de classifica??es em entidades denominadas vis?es conceituais dos elementos do modelo de neg?cio com base em caracter?sticas comuns. E relacionamentos entre essas vis?es. Desta forma, as defini??es dos pointcuts s?o criadas com base no modelo conceitual e n?o mais referenciando diretamente o modelo base da aplica??o. Al?m disso, o modelo conceitual cont?m um conjunto de relacionamentos que permite que seja verificado automaticamente se as classifica??es existentes no modelo conceitual continuam v?lidas mesmo ap?s uma evolu??o do software. Para tal, todo o desenvolvimento utilizando a abordagem de pointcuts baseados em vis?es conceituais ? apoiado por um arcabou?o denominado CrossMDA2 e por um processo de desenvolvimento baseado em MDA, ambos tamb?m propostos neste trabalho. Como prova de conceito, apresentamos duas vers?es de um estudo de caso, configurando um cen?rio de evolu??o que mostra como o uso de pointcuts baseados em vis?es conceituais auxilia na detec??o e minimiza??o da fragilidade de pointcuts. Para avalia??o da proposta ? usada a t?cnica de avalia??o Goal/Question/Metric (GQM) juntamente com m?tricas para an?lise da efici?ncia na defini??o dos pointcuts
149

Processus IDM pour l’intégration des patrons de sécurité dans une application à base de composants / An MDE process for security pattern integration in component based application

Bouaziz, Rahma 06 December 2013 (has links)
La sécurité est devenue un enjeu important dans le développement des systèmes logiciels actuels. La majorité des concepteurs de ces systèmes manquent d’expertise dans le domaine de la sécurité. Il s’avère donc important de les guider tout au long des différentes phases de développement logiciel dans le but de produire des systèmes plus sécurisés. Cela permettra de réduire le temps ainsi que les coûts de développement. Pour atteindre cet objectif, nous proposons d’appliquer l’expertise en matière de sécurité sous forme de patrons de sécurité lors de la phase de conception de logiciels. Un patron de sécurité intègre des solutions éprouvées et génériques proposées par des experts en sécurité. Cependant, les patrons de sécurité sont souvent négligés au niveau de la conception et ne constituent pas une solution intuitive qui peut être utilisée par les concepteurs de logiciels. Cela peut être le résultat de l’inadaptation de ces patrons au contexte des systèmes, la non-expertise des concepteurs dans le domaine de la sécurité ou encore l’absence d’un processus d’intégration de ces patrons dans les modèles à un haut niveau d’abstraction.Afin de permettre aux concepteurs d’utiliser les solutions proposées par des patrons de sécurité, cette thèse propose une approche d’ingénierie dirigée par les modèles pour sécuriser des applications via l’intégration de patrons de sécurité. Nous avons choisi comme contexte d’application de notre approche, les applications à base de composants qui visent à faciliter le développement d’applications à partir de l’assemblage de briques logicielles préfabriquées appelées composants. Le processus proposé assure la séparation entre l’expertise du domaine d’application et l’expertise de sécurité, toutes les deux étant nécessaires pour construire une application sécurisée. La méthodologie proposée assure une intégration semi-automatique des patrons de sécurité dans le modèle initial. Cette intégration est réalisée tout d’abord lors de la modélisation de l’application à travers, dans un premier temps, l’élaboration de profils étendant les concepts du domaine avec les concepts de sécurité. Dans un second temps, l’intégration se fait à travers la définition de règles, qui une fois appliquées, génèrent une application sécurisée. Finalement, cette intégration est assurée aussi au niveau de la génération du code fonctionnel de l’application en intégrant le code non-fonctionnel relatif à la sécurité à travers l’utilisation des aspects. L’utilisation de l’approche orientée aspect garantit que l’application des patrons de sécurité est indépendante de toute application particulière. Le processus proposé est décrit avec le standard SPEM.Ce travail a été concrétisé par un outil nommé SCRI-TOOL pour SeCurity patteRn Integration Tool. Cet outil permet aux développeurs non experts en sécurité d’intégrer les différentes propriétés de sécurité (intégrées dans les patrons) dans une application à base de composants. Afin d’illustrer l’utilisation de SCRI-TOOL, nous proposons une étude de cas portant sur le domaine des systèmes de soins distribués. Le choix d’une telle étude de cas s’explique par l’importance des exigences en termes de sécurité requises pour le bon fonctionnement d’une telle application. En effet, vue le grand nombre d’acteurs pouvant interagir, la sécurité est une exigence critique dans de tels systèmes. Cette étude nous a permis de mettre en évidence l’importance de la gestion de la sécurité à un haut niveau d’abstraction et la façon d’appliquer la méthodologie proposée sur un cas réel. / Security has become an important challenge in current software and system development. Most of designers are experts in software development but not experts in security. It is important to guide them to apply security mechanisms in the early phases of software development to reduce time and cost of development. To reach this objective, we propose to apply security expertise as security patterns at software design phase. A security pattern is a well-understood solution to a recurring information security problem. So, security patterns encapsulate the knowledge accumulated by security experts to secure a software system. Although well documented, patterns are often neglected at the design level and do not constitute an intuitive solution that can be used by software designers. This can be the result of the maladjustment of those patterns to systems context, the inexpertness of designers with security solutions and the need of integration process to let designers apply those pattern ? solutions in practical situations and to work with patterns at higher levels of abstraction. To enable designers to use solutions proposed by security patterns, this thesis proposes a model driven engineering approach to secure applications through the integration of security patterns. Component-based approach is a powerful means to develop and reuse complex systems. In this thesis, we take component based software systems as an application domain for our approach to facilitate the development of applications by assembling prefabricated software building blocks called components. The proposed process provides separation between domain expertise and application security expertise, both of which are needed to build a secure application. Our main goal is to provide a semi-automatic integrating of security patterns into component-based models, and producing an executable secure code. This integration is performed through a set of transformation rules. The result of this integration is a new model supporting security concepts. It is then automatically translated into aspect-oriented code related to security. These aspects are then woven in a modular way within the functional application code to enforce specified security properties. The use of aspect technology in the implementation phase guarantees that the application of security patterns is independent from any particular implementation. In order to provide a clear comprehension of the SCRIP process, we have described it using the standard SPEM . This work is implemented in a software tool called SCRI-TOOL (SeCurity patteRn Integration Tool). This tool allows not security experts developers to integrate different security properties throughout the development cycle of an component based application. To illustrate the use of SCRI-TOOL, we propose a case study regarding electronic healthcare systems. The choice of such a case study is motivated by the great attention archived for such systems from academia and industry and by the importance of security in such systems. Indeed, because of the large number of actors that can interact in such systems, security is a critical requirement. This case study will also allow us to illustrate the proposed methodology to highlight the importance of security management at a high level of abstraction. As results of the application of this process, we obtain a health care application completely secure and meeting the requirements of medical context.
150

Engineering a Three Dimensional Micropatterned Tumor Model for Breast Cancer Cell Migration Studies

January 2015 (has links)
abstract: Breast cancer cell invasion is a highly orchestrated process driven by a myriad of complex microenvironmental stimuli. These complexities make it difficult to isolate and assess the effects of specific parameters including matrix stiffness and tumor architecture on disease progression. In this regard, morphologically accurate tumor models are becoming instrumental to perform fundamental studies on cancer cell invasion within well-controlled conditions. In this study, the use of photocrosslinkable hydrogels and a novel, two-step photolithography technique was explored to microengineer a 3D breast tumor model. The microfabrication process presented herein enabled precise localization of the cells and creation of high stiffness constructs adjacent to a low stiffness matrix. To validate the model, breast cancer cell lines (MDA-MB-231, MCF7) and normal mammary epithelial cells (MCF10A) were embedded separately within the tumor model and cellular proliferation, migration and cytoskeletal organization were assessed. Proliferation of metastatic MDA-MB-231 cells was significantly higher than tumorigenic MCF7 and normal mammary MCF10A cells. MDA-MB-231 exhibited highly migratory behavior and invaded the surrounding matrix, whereas MCF7 or MCF10A cells formed clusters that were confined within the micropatterned circular features. F-actin staining revealed unique 3D protrusions in MDA-MB-231 cells as they migrated throughout the surrounding matrix. Alternatively, there were abundance of 3D clusters formed by MCF7 and MCF10A cells. The results revealed that gelatin methacrylate (GelMA) hydrogel, integrated with the two-step photolithography technique, has great promise in creating 3D tumor models with well-defined features and tunable stiffness for detailed studies on cancer cell invasion and drug responsiveness. / Dissertation/Thesis / Supplementary Movie 3 / Supplementary Movie 1 / Supplementary Movie 2 / Supplementary Movie 5 / Supplementary Movie 4 / Masters Thesis Bioengineering 2015

Page generated in 0.0255 seconds