• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 22
  • 17
  • 7
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 88
  • 24
  • 18
  • 12
  • 11
  • 10
  • 10
  • 8
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

QUANTIFICATION OF MYOCARDIAL MECHANICS IN LEFT VENTRICLES UNDER INOTROPIC STIMULATION AND IN HEALTHY RIGHT VENTRICLES USING 3D DENSE CMR

Liu, Zhan-Qiu 01 January 2019 (has links)
Statistical data from clinical studies indicate that the death rate caused by heart disease has decreased due to an increased use of evidence-based medical therapies. This includes the use of magnetic resonance imaging (MRI), which is one of the most common non-invasive approaches in evidence-based health care research. In the current work, I present 3D Lagrangian strains and torsion in the left ventricle of healthy and isoproterenol-stimulated rats, which were investigated using Displacement ENcoding with Stimulated Echoes (DENSE) cardiac magnetic resonance (CMR) imaging. With the implementation of the 12-segment model, a detailed profile of regional cardiac mechanics was reconstructed for each subject. Statistical analysis revealed that isoproterenol induced a significant change in the strains and torsion in certain regions at the mid-ventricle level. In addition, I investigated right ventricular cardiac mechanics with the methodologies developed for the left ventricle. This included a comparison of different regions within the basal and mid-ventricular regions. Despite no regional variation found in the peak circumferential strain, the peak longitudinal strain exhibited regional variation at the anterior side of the RV due to the differences in biventricular torsion, mechanism of RV free wall contraction, and fiber architecture at RV insertions. Future applications of the experimental work presented here include the construction and validation of biventricular finite element models. Specifically, the strains predicted by the models will be statistically compared with experimental strains. In addition, the results of the present study provide an essential reference of RV baseline evaluated with DENSE MRI, a highly objective technique.
72

OAuth 2.0 Authentication Plugin for SonarQube

Lavesson, Alexander, Luostarinen, Christina January 2018 (has links)
Many web services today give users the opportunity to sign in using an account belonging to a different service. Letting users authenticate themselves using another service eliminates the need of a user having to create a new identity for each service they use. Redpill Linpro uses the open source platform SonarQube for code quality inspection. Since developers in the company are registered users of another open source platform named OpenShift, they would like to authenticate themselves to SonarQube using their OpenShift identity. Our task was to create a plugin that offers users the functionality to authenticate themselves to SonarQube using OpenShift as their identity provider by applying the authentication framework OAuth. Theproject resulted in a plugin of high code quality according to SonarQube’s assessment. RedpillLinpro will use the plugin to easily access SonarQube’s functionality when using theapplication in their developer platform.
73

BLEEM BLOOM: um ambiente para musicologia assistida por computador

Vieira de Araújo Junior, Dídimo 31 January 2011 (has links)
Made available in DSpace on 2014-06-12T16:00:35Z (GMT). No. of bitstreams: 2 arquivo6778_1.pdf: 5875026 bytes, checksum: dac41b089f0a27b12afcbe7bb0a420f0 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2011 / Tribunal de Justiça de Pernambuco / Pesquisas na área de análise musical são beneficiadas pela possibilidade de resolver questões que envolvem análises complexas de grandes quantidades de dados musicais com a utilização do computador. Diferentemente da maioria das pesquisas sobre expressividade musical - que se concentram em música clássica para piano - o projeto "Um País, Um Violão", realizado no Centro de Informática da Universidade Federal de Pernambuco, estuda a dimensão rítmica da bossa nova ao violão. Vários temas sobre aquisição de conhecimento a respeito da expressividade musical já foram trabalhados dentro do projeto como o reconhecimento de padrões rítmicos, análise harmônica, microrrítmo e microdinâmica. Em se tratando de pesquisa preliminar e pioneira, um dos problemas em torno do projeto é que seus trabalhos foram realizados sem foco no público-alvo, os pesquisadores em musicologia, o que implica deficiências na usabilidade, fazendo com que, em alguns casos, seja praticamente impossível sua utilização por um usuário sem conhecimentos avançados em computação. Um outro problema do projeto é que seus trabalhos foram implementados em momentos distintos, sem qualquer preocupação em como eles poderiam ser integrados, mantidos e expandidos. Este trabalho de dissertação objetiva resolver os problemas estruturais e de usabilidade relacionados. Para tanto, a abordagem utilizada envolve a aplicação de métodos de interação humano-computador - para conceber uma solução adequada ao público-alvo - e a análise dos trabalhos atuais, para o projeto e construção de uma nova arquitetura baseada em plugins. O objetivo é oferecer novas possibilidades de análise através da integração também dos resultados de cada trabalho, estimulando o uso prático dos trabalhos científicos realizados no projeto "Um País, Um Violão". As avaliações dos protótipos e experimentos, realizadas por colaboradores representantes do público-alvo, mostraram considerações positivas a respeito do software proposto
74

Monitor and manage system and application configuration files at kernel level in GNU/Linux

Stanković, Saša January 2015 (has links)
The aim of this study is to investigate if there is a way a computer can accurately and automatically react on altered configuration file(s) with a minimum of resource utilization and by what means the developer(s) of an application can perform a check of the altered configuration file for their application. In a typical GNU/Linux installation the configuration files are literally counted by the thousands, monitoring these files is a task that for the most part exceeds any system administrator's abilities. Each file has its own syntax that needs to be known by the administrator. Either one of these two tasks could give any system administrator nightmares concerning the difficulty level especially when both tasks are combined. The system administrator could attempt to automate the monitoring tasks together with the syntax checking. There are some tools in the repositories of each distribution for monitoring files but none that lets one monitor and take (predefined or user defined) actions based on what the file monitor reports, the type of file and its contents. A complete tool is not presented in this study, merely a proof of concept that monitoring and taking actions especially with version 2.6.13 (or newer) kernel of GNU/Linux with plugins are quite possible with relatively small computer resource. During this study some questions arose that are worth taking into consideration when a complete monitoring tool is to be developed, amongst others they are: add a trusted user, add both textual and graphical user interface, monitor more than one file path. This study was performed on GNU/Linux CentOS 6 distribution, all programming was done in BASH with an effort to minimize used/installed programs.
75

Návrh mobilní aplikace pro správu serveru / Mobile application for remote server management

Kolář, Jakub January 2015 (has links)
Thesis deals with remote servers specifically those for the Minecraft. These servers are divided into groups. The work examines the possibility of remote access to these servers on network protocols level, which are described briefly, and also at the level of the game itself. Describes the game options that can be influenced via remote management. Then analyzes the applications that are intended for this remote access, and identifies problems associated with them. Based on the issues that implied from this analysis, application that solves these problems is designed. The first chapter contains a brief description of the network protocols that can be used to remotely manage servers for the Minecraft and identifies the most appropriate protocol. The next chapter describes the Minecraft, and specifically those of its regions which can be influenced via remote management. The next chapter analyzes the applications that can be used to remotely manage Minecraft servers and based on the problems that this analysis identifies, an application that solves these problems is designed. The designed application is then implemented. The last part contains user documentation of created application.
76

Nástroj pro analýzu obsahu síťové komunikace / Analysis Tool for the Network Traffic Content

Mareš, Martin January 2014 (has links)
This paper is about designing and implementing a tool for analysis of the network traffic content. Work is part of the SEC6NET project at FIT - Brno University of Technology. The paper describes specific requirement for such a tool and existing solutions. The main part is devoted to design and implementation of new tool - Netfox Detective. Several problems are handled: data persistence, performance, extensibility, etc. The last part of work describes possibilities and features of the Netfox Detective. The work emphasises extensibility and future development of a created tool.
77

Spamerkennung mit Support Vector Machines

Möller, Manuel 22 June 2005 (has links)
Diese Arbeit zeigt ausgehend von einer Darstellung der theoretischen Grundlagen automatischer Textklassifikation, dass die aus der Statistical Learning Theory stammenden Support Vector Machines geeignet sind, zu einer präziseren Erkennung unerwünschter E-Mail-Werbung beizutragen. In einer Testumgebung mit einem Corpus von 20 000 E-Mails wurden Testläufe verschiedene Parameter der Vorverarbeitung und der Support Vector Machine automatisch evaluiert und grafisch visualisiert. Aufbauend darauf wird eine Erweiterung für die Open-Source-Software SpamAssassin beschrieben, die die vorhandenen Klassifikationsmechanismen um eine Klassifikation per Support Vector Machine erweitert.
78

[en] TOPSIM: A PLUGIN-BASED FRAMEWORK FOR LARGE-SCALE NUMERICAL ANALYSIS / [pt] TOPSIM: UM SISTEMA BASEADO EM PLUGIN PARA ANÁLISE NUMÉRICA EM LARGA ESCALA

LEONARDO SEPERUELO DUARTE 12 January 2017 (has links)
[pt] Métodos computacionais em engenharia são usados na solução de problemas físicos que não possuem solução analítica ou sua perfeita representação matemática é inviável. Técnicas de métodos numéricos, incluindo o amplamente usado método dos elementos finitos, podem exigir a solução de sistemas lineares com centenas de milhares de equações, demandando altos recursos computacionais (memória e tempo). Nesta tese, nós apresentamos um sistema baseado em plugins para análise numérica em larga escala. O sistema é usado como uma ferramenta original na solução de problemas de otimização topológica usando o método dos elementos finitos com milhões de elementos. Nossa estratégia utiliza uma técnica elemento-por-elemento para implementar um código altamente paralelo para um solver iterativo com baixo consumo de memória. Além disso, a abordagem de plugin proporciona um ambiente completamente flexível e fácil de estender, onde diferentes aplicações, exigindo diferentes tipos de elementos finitos, materiais, solvers lineares e formulações podem ser desenvolvidos e melhorados. O kernel do sistema é mínimo, com apenas um módulo gerenciador de plugin, responsável por carregar os plugins desejados em tempo real usando um arquivo de configuração de entrada. Todas as funcionalidades necessárias para uma determinada aplicação são definidas dentro dos plugins, sem a necessidade de mudar o kernel. Plugins podem disponibilizar ou exigir interfaces adicionais especializadas, onde outros plugins podem ser conectados para compor um sistema mais complexo e completo. Nós apresentamos resultados para uma análise estrutural estática linear elástica e para uma análise estrutural de otimização topológica. As simulações utilizam elementos Q4, hexagonal (Brick8) e prisma hexagonal (Honeycomb), com solvers diretos e iterativos usando computação sequencial, paralela e distribuída. Nós investigamos o desempenho com relação ao uso de memória e escalabilidade da solução para problemas com diferentes tamanhos, de exemplos pequenos a muito grandes em apenas uma máquina e em um cluster. Foi simulado um exemplo de análise estática linear elástica com 500 milhões de elementos em 300 máquinas. / [en] Computational methods in engineering are used to solve physical problems that do not have analytical solution or their perfect mathematical representation is unfeasible. Numerical techniques, including the largely used finite element method, require the solution of linear systems with hundreds of thousands equations, demanding high computational resources (memory and time). In this thesis, we present a plugin-based framework for large-scale numerical analysis. The framework is used as an original tool to solve topology optimization problems using the finite element method with millions of elements. Our strategy uses an element-by-element technique to implement a highly parallel code for an iterative solver with low memory consumption. Besides, the plugin approach provides a fully flexible and easy to extend environment, where different types of applications, requiring different types of finite elements, materials, linear solvers, and formulations, can be developed and improved. The kernel of the framework is minimum with only a plugin manager module, responsible to load the desired plugins during runtime using an input configuration file. All the features required for a specific application are defined inside plugins, with no need to change the kernel. Plugins may provide or require additional specialized interfaces, where other plugins may be connected to compose a more complex and complete system. We present results for a structural linear elastic static analysis and for a structural topology optimization analysis. The simulations use elements Q4, hexahedron (Brick8), and hexagonal prism (Honeycomb), with direct and iterative solvers using sequential, parallel and distributed computing. We investigate the performance regarding the use of memory and the scalability of the solution for problems with different sizes, from small to very large examples on a single machine and on a cluster. We simulated a linear elastic static example with 500 million elements on 300 machines.
79

Securing Network Connected Applications with Proposed Security Models

Konstantaras, Dimitrios, Tahir, Mustafa January 2008 (has links)
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security</p><p>within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.</p><p>By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.</p><p>An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.</p>
80

Securing Network Connected Applications with Proposed Security Models

Konstantaras, Dimitrios, Tahir, Mustafa January 2008 (has links)
In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies. However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications. By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies. An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.

Page generated in 0.0272 seconds