• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1451
  • 532
  • 294
  • 170
  • 155
  • 116
  • 48
  • 44
  • 43
  • 29
  • 26
  • 20
  • 20
  • 20
  • 20
  • Tagged with
  • 3621
  • 632
  • 513
  • 483
  • 389
  • 378
  • 364
  • 314
  • 293
  • 290
  • 239
  • 239
  • 239
  • 228
  • 216
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
711

REALIZING INFORMATION ESCROWS AND EFFICIENT KEY-MANAGEMENT USING THRESHOLD CRYPTOGRAPHY

Easwar V Mangipudi (13169733) 29 July 2022 (has links)
<p>In this thesis, we address two applications of threshold cryptography — designing information escrows and key-distribution in cryptocurrency systems. We design escrow mechanisms in two-party and multi-party scenarios such that any unauthorized revelation of<br> data results in the loss of cryptocurrency by the dishonest party. Later, we discuss user mental models in adopting cryptocurrency wallets and propose a protocol to efficiently provide cryptographic keys to the users in large-user systems. An information escrow refers to users storing their data at a custodian such that it can be revealed later. In the case of unauthorized leakage of this data by the custodian (receiver of data), taking legal actions is expensive, time consuming and also difficult owing to difficulty in establishing the responsibility. We address this by automatically penalizing the custodian through the loss of cryptocurrency in case of leakage. Initially, we consider a two party scenario where a sender forwards multimedia data to a receiver; we propose the Pepal protocol<br> where any total or partial leakage of data penalizes the receiver. To avoid single point of failure at the receiver in a two-party system, we extend the protocol to a multi-party system where a group of agents offer the escrow as a service. However, this introduces a collusion scenario among the rational agents leading to premature and undetectable unlocking of the data. Addressing this, we propose a collusion-deterrent escrow (CDE) protocol where any collusion among the agents is penalized. We show that the provably secure protocol deters collusion in game-theoretic terms by dis-incentivising it among the rational agents. In the second part of this work, we investigate the mental models of cryptocurrency wallet users in choosing single-device or multi-device wallets along with their preferences. We investigate the user-preferred default (threshold) settings for the key distribution in the wallets. We then propose the D-KODE protocol, an efficient key-generation mechanism for<br> cryptocurrency systems where either the payee or payer may not have the cryptographic setup but wish to transact. The protocol utilizes a practical black-box secret sharing scheme along with a distributed almost key-homomorphic PRF to achieve the threshold key distribution.</p>
712

A General Machine Reading Comprehension pipeline

Debruyker, Roxane 19 September 2022 (has links)
Savoir lire est une compétence qui va de la capacité à décoder des caractères à la compréhension profonde du sens de textes. Avec l'émergence de l'intelligence artificielle, deux questions se posent : Comment peut-on apprendre à une intelligence artificielle à lire? Qu'est-ce que cela implique? En essayant de répondre à ces questions, une première évidence nous est rappelée : savoir lire ne peut pas se réduire à savoir répondre à des questions sur des textes. Étant donné que les modèles d'apprentissage machine apprennent avec des exemples d'essai erreur, ils vont apprendre à lire en apprenant à répondre correctement à des questions sur des textes. Cependant, il ne faut pas perdre de vue que savoir lire, c'est comprendre différents types de textes et c'est cette compréhension qui permet de répondre à des questions sur un texte. En d'autres termes, répondre à des questions sur des textes est un des moyens d'évaluation de la compétence de lecture plus qu'une fin en soi. Aujourd'hui, il existe différents types de jeux de données qui sont utilisées pour apprendre à des intelligences artificielles à apprendre à lire. Celles ci proposent des textes avec des questions associées qui requièrent différents types de raisonnement : associations lexicales, déductions à partir d'indices disséminés dans le texte, paraphrase, etc. Le problème est que lorsqu'une intelligence artificielle apprend à partir d'un seul de ces jeux de données, elle n'apprend pas à lire mais est plutôt formée à répondre à un type de question, sur un certain type de texte et avec un certain style d'écriture. Outre la problématique de la généralisation des compétences de lecture, les modèles d'intelligence artificielle qui apprennent à lire en apprenant à répondre à des questions retournent des réponses sans systématiquement indiquer sur quelles phrases du texte sources ils se basent. Cela pose un problème d'explicabilité et peut entrainer une mécompréhension des capacités de ces modèles. Dans ce mémoire, nous proposons de résoudre le problème de généralisation de l'apprentissage en proposant une méthodologie générale adaptée à n'importe quel jeu de données. Ainsi, en ayant une méthodologie commune à tous les types de jeux de données pour apprendre à répondre à tout type de question, sur tout type de texte, nous pourrions apprendre aux modèles d'intelligence artificielle à se concentrer sur les compétences générales de lecture plutôt que sur la capacité spécifique à répondre aux questions. Afin de résoudre également le problème de l'explicabilité, la méthodologie que nous proposons impose à tout modèle de compréhension de lecture automatique de renvoyer les extraits du texte source sur lequel ces réponses sont basées. / Reading is a skill that ranges from the ability to decode characters to a deep understanding of the meaning of a text. With the emergence of artificial intelligence, two questions arise: How can an artificial intelligence be taught to read? What does this imply? In trying to answer these questions, we are reminded of the obvious: knowing how to read cannot be reduced to knowing how to answer questions about texts. Since machine learning models learn with trial-and-error examples, they will learn to read by learning to answer correctly questions about the text they read. However, one should not forget the fact that knowing how to read means understanding different types of texts sufficiently well, and it is this that enables answering questions about a text. In other words, answering questions about texts is one of the means of assessing reading skills rather than an end in itself. Today, there are different types of datasets that are used to teach artificial intelligences to learn to read. These provide texts with associated questions that require different types of reasoning: lexical associations, deductions from discrete clues in the text, paraphrasing, etc. The problem is that when an artificial intelligence learns from only one of these datasets, it does not learn to read but is instead trained to answer a certain type of question, on a certain type of text and with a certain writing style. In addition to the problem of generalizing reading skills, artificial intelligence models that learn to read by learning to answer questions return answers without systematically indicating which sentences in the source text they are based on. This poses a problem of explicability and can lead to a misunderstanding of the capabilities of these models. In this thesis, we propose to solve the generalization issue of learning from one dataset by proposing a general methodology suiting to any machine reading comprehension dataset. Thus, by having a methodology common to all types of datasets to learn how to answer any type of question, on any type of text, we could teach artificial intelligence models to focus on general reading skills rather than on the specific ability to answer questions. In order to also solve the issue of explanability, the methodology we propose impose any machine reading comprehension model to return the span of the source text its answers are based on.
713

Novel Computer Vision-based Vehicle Non-contact Weigh-in-Motion System

Leung, Ryan January 2022 (has links)
Heavy vehicle weights must be closely monitored to prevent fatigue-induced deterioration and critical fracture to civil infrastructure, among many other purposes. Developing a cost-effective weigh-in-motion (WIM) system remains challenging. This doctoral research describes the creation and experimental validations of a computer vision-based non-contact vehicle WIM system. The underlining physics is that the force exerted by each tire onto the roadway is the product of the two key vehicle parameters: tire-roadway contact pressure and contact area. Computer vision is applied (1) to measure the several tire parameters so that the tire-roadway contact area can be accurately estimated; and (2) to recognize the marking texts on the tire sidewall so that the manufacturer-recommended tire pneumatic pressure can be found. Consequently, a computer vision system is developed in this research. The computer vision system comprises a camera and computer vision software/techniques for measuring the tire parameters and recognizing the tire sidewall markings from individual tire images of a moving vehicle. Computer vision techniques, such as edge detection and optical character recognition (OCR), are applied to enhance the measurements and recognition accuracy. Numerous laboratory and field experiments were conducted on a sport utility vehicle and fully loaded or empty concrete trucks to demonstrate the feasibility of this novel method. The vehicle weights estimated by this novel computer vision-based non-contact vehicle WIM system agreed well with the curb weights verified by static weighing, demonstrating the potential of this computer vision-based method as a non-contact means for weighing vehicles in motion. To further illustrate and exemplify the versatility of this novel computer vision-based WIM system, this research explores the potential application capability of the system for structural health monitoring (SHM) in civil engineering. This work aims to investigate the potential of this proposed and prototyped computer vision-based vehicle WIM system to acquire vehicle weight and location information as well as to obtain corresponding bridge responses simultaneously for later structural model updating analysis and damage detection and identification framework. In order to validate the concept, a laboratory vehicle-bridge model was constructed. Subsequently, numerous experiments were carried out to demonstrate how the computer vision-based WIM system can be utilized as a resourceful application to (1) extract bridge responses, (2) estimate vehicle weight, and (3) localize the input force simultaneously. This doctoral research delivers a unique, pioneering, and innovative design and development of a computer vision-based non-contact vehicle WIM method and system that can remotely perform vehicle weight estimation. It also demonstrates a novel application of computer vision technology to solve challenging weigh-in-motion (WIM) and civil engineering problems.
714

Unlocking the Potential of Carbonaceous Resource Recovery from the Arrested Anaerobic Digestion of Food Waste: Engineering Design and Meta-omics Analysis

Jiang, Minxi January 2022 (has links)
Organic waste-fueled carbonaceous resource recovery using approaches such as arrested anaerobic digestion generates economically attractive products such as volatile fatty acid (VFA). The production of VFA expands the applications of anaerobic biotechnologies beyond the traditionally produced biogas. Compared to biogas, VFA is produced and recovered in a concentrated form in the aqueous phase, which is more conducive to direct utilization in downstream bioplastic, biodiesel production, and nitrogen/phosphorus removal in water resource-recovery facilities. However, this application is limited by the variability in VFA yield and composition as obtained from different complex solids streams. Additionally, the lack of understanding of the nexus between the performance-structure-function of the microbial community within the arrested anaerobic digestion process leads to the massive gap between the optimized engineering regulations and the high-throughput VFA production. Consequently, this dissertation aimed to unlock the potential of VFA production with maximized yield and regulated composition through the manipulation of the operational parameter (hydraulic retention time (HRT)) and the feedstock condition (thermal hydrolysis pretreatment (THP)). In response, meta-omics-derived approaches were applied to elucidate the dynamic changes of microbial structure, potential, and extant functionality in terms of the two processes (hydrolysis and acidification) within arrested anaerobic digestion of food waste. Specifically, the objectives were (1) Performance: Evaluate the hydrolysis and acidification performance changes including hydrolysis yield, VFA yield, VFA composition, methane yield, etc. under different HRTs and feeding THP or non-THP food waste. (2) Microbial structure: characterize and compare the significance of HRT and feedstock condition in shaping microbial structures. (3) Functional analysis: Interpret the community-level dynamic changes of potential and extant functions within the (3.1) customized acidification metabolic networks and the (3.2) carbohydrate hydrolysis niches. The highlighted findings are as follows: (1) Performance of the arrested anaerobic digestion (including hydrolysis and acidification processes): Neither the hydrolysis yield nor the VFA yield was improved by the extended HRT from 4 to 8 days (P > .05). The inclusion of THP on feedstock didn’t improve the hydrolysis yield (P > .05) while the VFA yield was significantly decreased (P = .003). Among all conditions, the methane production was less than 5% of the chemical oxygen demand (COD) and a propionic acid-dominant type product was robustly formed. (2) Microbial structures in the arrested anaerobic digestors (including core hydrolyzers and acidification microbial communities): Both HRT and the inclusion of THP on feedstock shaped distinct microbial structures in the arrested anaerobic digestors (P = .02 and .01). Although the extension of HRT didn’t change the Shannon diversity Index (P > .05), it was significantly decreased after feeding with THP food waste (P = .03), which might stem from the reduced indigenous microbes in the initial food waste feedstock. Prevotella was always the most abundant genus under all conditions, which might contribute to the dominantly produced propionic acid among all conditions. The successfully suppressed growth of methanogenic archaea was reflected in terms of the low relative abundance (<1.5%) among all conditions. (3.1) Functional analysis of the customized acidification metabolic networks: Under the two selected HRTs, the potential and extant functions of acidification were unchanged between the two reactors (P > .05), which indicated a community-level redundancy in convergent potential and extant acidification functions even under a completely shifted microbial structure. However, the inclusion of THP diminished the potential and extant functions of acidification, in the meantime, shifting the main producer of butyric acid from Bacteroides to Prevotella through the expression of gene buk2. Among all conditions, the highest potential and extant functions in propionic acid production corresponded to the propionic acid-dominant acid profile in all reactors. The prevalently enriched Prevotella contributed to the stable propionic acid-dominant production via the acryloyl-CoA to propionyl phosphate to the propionic acid pathway. (3.2) Functional analysis of the carbohydrate hydrolysis niches: The extension of HRT from 4 days to 8 days didn’t impact the potential and extant functions of carbohydrate-activated enzymes (CAZys) and the hydrolysis of polysaccharides. Only two intermediate steps (gene malQ and lplD) during the hydrolysis of starch and pectin were enhanced with higher absolute transcriptional activities (mRNA/DNA RPKM) under HRT 8 days. The abundance ratio of the two main hydrolysis phyla Firmicutes: Bacteroidetes was unchanged between the two HRTs. When feeding with THP feedstock, the potential and extant functions of CAZys were both enhanced. All steps within the hydrolysis of cellulose (polysaccharides) exhibited increased absolute transcriptional activities (mRNA/DNA RPKM). The abundance ratio of Firmicutes: Bacteroidetes was decreased after the inclusion of THP on feedstock, which corresponded to the increased hydrolysis of polysaccharides- cellulose. Although the carbohydrate hydrolysis functions were improved after feeding with THP food waste, the total hydrolysis yield was not enhanced. The hydrolysis of other compounds such as proteins and lipids could also contribute to the total hydrolysis yield. The taxonomic analysis revealed that in all four conditions, the genus Prevotella presented with the highest potential functions in CAZys, while the genus Pararhodospirillum exhibited the highest extant functions in CAZys. This indicated that distinct bacteria were endowed with different functional potentials of CAZys and mobilized these functions differently. Overall, this research provides practical suggestions for engineering designs to maximize the VFA production profits from arrested anaerobic digestion of food waste: (1) A properly controlled HRT enables a long-term high-throughput production of VFA with stable yield and the unchanged dominant acid type (2) The inclusion of THP to the feedstock was not suggested to be applied to maximize the VFA yield even the dominant acid type may not change. (3) The dominantly produced propionic acid could be targeted by enriching the Prevotella genus to produce the propionic acid through the acryloyl-CoA to propionyl phosphate to the propionic acid pathway. Besides the engineering aspect, this research also specifically elucidates the long-time lumped and simplified acidification and carbohydrate hydrolysis processes with the extended metabolic databases including each reaction, key intermediates, enzymes, and corresponding genes. This expanded database served as an essential upstream process, which could be integrated into the current anaerobic digestion model. Additional applications could be extended to the human digestion systems' microbiome and be exploited commercially for other mixed-culture biosynthesis processes such as bioplastic and biodiesel production. Finally, the application of meta-omics-derived methodology revealed the functional redundancy and the potential discrepancy between the most abundant group and the most actively functional group underlying the formed black box of VFA production performance. This discussion of the nexus of performance-structure-function suggested the importance of applying meta-omics approaches in engineering practice, especially when feeding the mixed-culture community with real complex solid streams. The targeted VFA profiles cannot be reached without identifying the actual functional bacteria under selected engineering conditions.
715

Analysing the approach of downloading applications on Android devices

Shams, Walid January 2016 (has links)
Syftet med Androids system för åtkomsttillåtelser är att informera användaren om riskernasom kan uppstå vid nedladdning av en applikation. När en användare väljer att ladda neren speci k applikation, presenteras den med en display av åtkomsttillåtelser, dvs. datasom applikationen vill ha tillgång till. Användaren har då ett val att antingen tillåta allaåtkomsttillåtelser, eller avbryta nedladdningen.I denna studie undersöker vi androidanvändarnas kunskap om hot som kan uppstå vidnedladdning av en applikation och vilka åtgärder de tar för att hindra dessa hot från attuppstå.Via enkätundersökningar undersöker vi vilka åtgärder användaren vidtar när personenladdar ner en applikation och om dessa åtgärder påverkas utifrån kunskap och förståelsekring åtkomsttillåtelser och potentiella hot.Slutligen kontrollerar vi om användarnas åsikt kring säkerheten förändras gällandesäkerhetsåtgärder efter att ha besvarat enkäten.Min hypotes är att användarna är medvetna om att det nns potentiella hot mot derasenheter och att, trots att displayen för åtkomsttillåtelser är till för att varna användaren,bryr sig användaren inte om detta. Vidare tror jag inte att det nns någon större skillnadenmellan könen och mellan deras kunskap om hot som kan uppstå vid nedladdningar, vilketockså gäller för åldersgrupperna.Resultatet visar att er män än kvinnor är medvetna om riskerna och tar åtgärder föratt skydda sig mot dessa. Det gäller även den äldre åldersgruppen då den yngre åldersgruppenvisar mindre medvetenhet om riskerna.Vidare visar resultatet att majoriteten av användarna faktiskt har låg riskmedvetenhet,vilket inte stämde överens med min hypotes. 13 av 39 respondenter är bekanta med displayenför åtkomsttillåtelser varav 10 kontrollerar dessa åtkomster och 10 av 39 är bekantamed malwares. Färre kvinnor har kunskap om dessa hot till skillnad från män, samt äldreåldersgruppen visar mer riskmedvetenhet än den yngre åldersgruppen. / The purpose of the Android's permissions system is to allow users to be informed aboutrisks that can occur when downloading an application. When a user chooses to downloada speci c application, they are presented with a display of permissions. The user then hasa choice to either allow all the permissions, or cancel the download.In this study, we will examine android users knowledge of threats that can occur whendownloading an application and what steps they take to prevent these threats from occuring.A survey will be made, to analyze what measures users take when downloading anapplication and if these measures are a ected based on their knowledge and understandingof permissions and potential threats. Lastly we will check if users opinion about securitychanges regarding safety measures after conducting part of the survey.My hypothesis is that users are aware that there are potential threats to their unitsand that the permissions display is intended to alert the user, but they do not take thisinto account. Further I believe that the di erence of knowledge of threats between gendersthat can occur is not great, which also applies to the di erent age groups.Results show that more men than women are aware of risks and take measures toprotect themselves from these which also applies to the older age group where the youngergroup are less aware of risks. Further shows the result that majority of users actually havelow risk awareness which is not consistent with my hypothesis. 13 of 39 users are awareof the permissions display in which 10 of them examines the permissions and 10 of 39 areaware of malwares. Fewer women than men have knowledge regarding these threats, alsothe older age group show more risk awareness than the younger age group.
716

Volumes of Balls in Grassmann Manifolds with Applications to Coding Theory

Keenan, Patrick Jordan 19 April 2008 (has links)
<p> This thesis develops the Riemannian Geometry of the real and complex Grassmann Manifolds in a notationally accessible way. The canonical volume form is related to explicit Jacobi Field calculations. The implementation of a packing algorithm based on repulsive forces is proposed. Standard packing bounds and bounds on the volumes of geodesic balls are used to test the performance of the algorithm.</p> / Thesis / Master of Science (MSc)
717

Defect Engineering for Silicon Photonic Applications

Walters, David January 2008 (has links)
<p> The work described in this thesis is devoted to the application of defect engineering in the development of silicon photonic devices. The thesis is divided into simulation and experimental portions, each focusing on a different form of defect engineered silicon: ion implantation induced amorphous silicon and solid-phase epitaxial regrowth suppressed polycrystalline silicon.</p> <p> The simulations are directed at silicon rib waveguide Raman laser applications. It is shown that a uniform, divacancy defect concentration will not enhance Raman gain. The excess optical loss and free carrier lifetime of rib waveguides with remote amorphous silicon volumes were simulated. Net gain was demonstrated depending on the geometry of the structure. For a waveguide structure with rib width, rib height and slab height of W = 1.5, H = 1.5 and h = 0.8 μm respectively, the optimal separation between the edge of the rib and the amorphous region is ~2.0 μm. Surface recombination velocity modification was shown to be an effective means to reduce free carrier lifetime.</p> <p> Experimental work was devoted to the characterization of a novel form of polycrystalline silicon created by amorphizing the entire silicon overlayer of a silicon-on-insulator wafer. Solid-phase epitaxial regrowth of the amorphous silicon is suppressed upon annealing due to the lack of a crystal seed and results in polycrystalline silicon. This material was characterized with ellipsometry, positron annihilation spectroscopy and x-ray diffraction. The material properties are shown to be heavily dependent on the annealing conditions. Ellipsometry showed that the refractive index at 1550 nm is comparable to crystalline silicon. Positron annihilation spectroscopy showed that the polycrystalline material exhibits a high concentration of vacancy-type defects while vertically regrown crystalline silicon does not. X-ray diffraction showed that the polycrystalline silicon is non-textured, strained in tension and is characterized by grain sizes less than 300 nm.</p> <p> Defect etching and optical measurements using a waveguide geometry were performed in order to characterize the lateral regrowth and the optical loss of the polycrystalline material. Lateral regrowth in the [011] direction was 1.53 and 0.96 μm for 10 minute anneals at 750 and 900 °C respectively, and at least 2.5 μm at 650 °C. Waveguide optical loss measurements with adjacent polycrystalline regions separated from the rib by at least 5.5 μm showed no separation dependence. The intrinsic optical loss of the polycrystalline material was estimated to be 1.05 and 1.57 dB/cm for TM and TE polarizations after a 900 °C anneal. Vertically regrown c-Si was shown to exhibit less than 3.0 dB/cm optical loss after annealing at 550 °C .</p> / Thesis / Master of Applied Science (MASc)
718

Ultra-Wideband Antennas for Medical Imaging and Communication Applications

Jafari, Hamed Mazhab 08 1900 (has links)
<p> The allocation of 7.5 GHz of bandwidth by the Federal Communication Commission (FCC) for ultra-wideband (UWB) applications has provided an exciting and a challenging opportunity to design short range wireless communication and microwave imaging systems. To fully realize the potential of the UWB, communication and microwave imaging systems are required to operate over the entire UWB frequency band. The combination of the wide bandwidth requirement and the target application of the UWB systems have led to a surge of interest in designing of novel integrated circuits and antennas for the UWB applications. In any wireless communication and microwave imaging system, the antenna has a fundamental effect on the overall performance of the system, and as a result, it has attracted considerable research interest.</p> <p> This thesis focuses on the design of UWB antennas that are suitable for UWB cancer detection and wireless communication systems. Two planar antennas, one a printed monopole antenna, and the other, a printed slot antenna fed with a coplanar waveguide, are presented in this work. First, the antennas have been designed to operate in air, making them suitable for the UWB wireless short range communication applications. Measurement and simulation results indicate that both antennas achieve input impedance matching in a bandwidth of more than 7.5 GHz. The effect on the input matching of the antennas due to the variation in their geometrical parameters has been studied and both antennas have been fully characterized in air. Next, the two antennas have been redesigned to operate in a coupling medium for medical imaging applications. Both antennas achieve return loss of less than -10 dB over the entire UWB spectrum. Also, the antennas have been fully characterized while operating in the coupling medium and in proximity to a human body model. Finally, a two-element antenna array, based on the printed monopole antenna and the printed slot antenna, in co- and cross-polarized array formation, has been designed. The tumor detection capabilities of all antenna arrays for different scenarios have been studied through electromagnetic simulation and measurements.</p> / Thesis / Master of Applied Science (MASc)
719

Basic Fibroblast Growth Factor (FGF-2) Delivery From Heparin Modified Surfaces for Artificial Cornea Applications / FGF-2 Delivery from Heparinized PDMS and Collagen Materials

Princz, Marta A. 09 1900 (has links)
Device anchoring of artificial cornea implants, through tissue integration of stromal tissue, is necessary to ensure long-term success. In this work, the delivery of basic fibroblast growth factor (FGF-2), a key modulator in corneal wound healing, via heparin modified materials was investigated as a means of sustained, soluble growth factor delivery for stimulation of device anchorage. Two materials types, commonly used for ophthalmic applications and currently under investigation for use in artificial cornea applications, were utilized. Poly (dimethyl siloxane) (PDMS) is currently under investigation as the base material for keratoprosthetic devices; dendrimer crosslinked collagen has been examined as the basis for use as a tissue engineered corneal equivalent. PDMS surfaces were modified directly or indirectly, through a poly (ethylene oxide) (PEO) spacer, to contain functionalized reactive NSC groups capable of binding heparin and FGF-2 Surface modifications were characterized with attenuated total reflection Fourier transform infrared spectrophotometer (ATR-FTIR), X-ray photoelectron spectroscopy (XPS) and water contact angles. Heparin coverage was assessed with metachromatic and bioactivity assays. Heparinized collagen gels were crosslinked with 1-ethyl-3-(3-dimethylaminopropyl) carbodiimide hydrochloride (EDC), N-hydroxysuccinimide (NHS) and polypropyleneimine octaamine G2 dendrimers. Gel integrity was assessed with water uptake, differential sr::anning calorimetry, and heparin and dendrimer stability. Both materials were exposed to radiolabelled FGF-2 and growth factor immobilization and delivery were quantified. Heparinized PDMS surfaces were capable of binding on average 100 ng/cm2 ofFGF-2, while heparinized collagen gels had higher FGF-2 immobilization, 300 ng, likely attributed to their higher heparin densities and the fact that the bulk gel rather than the surface only was modified. Delivery of FGF-2 from the heparinized materials revealed a first order release profile, with an initial burst of FGF-2, followed by gradual growth factor release. Release rates, over a 2 week period, reached 6.5% and 50%, for 1 day and 3 day FGF-2 exposed heparinized PDMS modified surfaces, while hepruinized dendrimer crosslinked collagen gels released 40%. / Thesis / Master of Applied Science (MASc)
720

Flaw Tolerant Alumina/Zirconia Multilayered Composites

Hatton, Benjamin 09 1900 (has links)
Ceramic composites for high temperature applications must be designed with crack arrest capability to improve the resistance to flaws produced in service, such as by thermal shock. Laminated composites containing Al2O3 layers in 3mol%Y2O3-ZrO2 (TZ3Y) were fabricated by electrophoretic deposition (EPD) and pressureless sintering. The layering design (Al2O3 layer thickness and volume fraction) was varied to determine the influence on fracture behaviour. The residual stress in Al2O3 layers was measured using a fluorescence spectroscopy technique. The fracture strength of 15 different laminates, and monolithic Al2O3 and TZ3Y, was tested in 4-point bending at room temperature. Vickers indentation (10 kg load) was used to simulate natural flaws at the sample surface before testing as a measure of flaw tolerance. Fracture ranged from catastrophic failure, to multi-stage failure and complete delamination (in processing). Transitions in behaviour were found related to a geometrical parameter derived from the strain energy release rate for edge cracks. The strength of three Al2O/TZ3Y composites was compared with monolithic Al2O3 and TZ3Y for a range of indentation loads (up to 20 kg). The strength of the composites was similar to monolithic TZ3Y but the flaw tolerance was improved due to multi-stage fracture. The strength and flaw tolerance (using 10 kg indentation) of two Al2O3/TZ3Y composites and monolithic TZ3Y was measured < 1300°C. The multi-stage fracture behaviour disappeared > 25 °C, and there was no beneficial effect of the Al2O3 layers on the strength. Superplastic deformation of the TZ3Y layers at 1300°C was prevented by the constraint of the Al2O3 layers. Recommendations are made about the design of flaw tolerant ceramic laminates for high temperature use. / Thesis / Master of Engineering (ME)

Page generated in 0.0877 seconds