• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 21
  • 13
  • 10
  • 6
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 97
  • 14
  • 13
  • 13
  • 12
  • 12
  • 12
  • 12
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Differentially expressed genes in the brain stem of the endotoxemia rat

Yang, Chang-Jie 08 September 2003 (has links)
Abstract Recent studies demonstrated that LPS treated Sprague-Dawley rats induced a reduction (Phase I), followed by an augmentation (Phase II) and a secondary decrease (Phase III) in the power density of vasomotor components (0-0.8 Hz) in systemic arterial pressure signals. The molecular mechanisms underlie the progression toward death in the brain stem is unclear. In order to find out the differentially expressed genes between LPS-treated RVLM and saline-treated RVLM, we used suppression subtractive hybridization,a method commonly used to search differentially expressed genes, and subtractive cDNA library construction. At present, we have found some differentially expressed genes and these genes are up-regulation expression. These genes may be involved in the progression toward death in the rat brain stem.
2

1. SLP1 (選択プロジェクト) 部会中間報告 (VI.研究グループ中間報告)

薫森, 英夫, SHIGEMORI, H., 矢木, 修, YAGI, O., 飯島, 幸久, IJIMA, Y., 川田, 基生, KAWATA, M., 杉本, 雅子, SUGIMOTO, M., 鈴木, 義晴, SUZUKI, Y., 西川, 陽子, NISHIKAWA, Y., 長瀬, 加代子, NAGASE, K. 30 November 2006 (has links)
国立情報学研究所で電子化したコンテンツを使用している。
3

Vzdálené připojení na virtualizovaný operační systém / Remote connection to virtualized operating system

Veselý, Marek January 2015 (has links)
The thesis is focused on the new IT trend – virtualization. Below are described the types of virtualization, as well as different implementations of it. In the following chapters there will be described the TCP and ICMP protocols, as well as the SSH services. The last part of this work is dedicated to measurements where there will be highlighted the advantages and disadvantages of virtualization.
4

Bezpečená komunikace mezi data loggerem a databazovým serverem / Secure communication between data logger and database server

Ferek, Matúš January 2011 (has links)
This work is aimed to analyze security risks of data transfer in Internet network and to design couple of possible solutions for securing communication between data logger and server for data processing. As a result, solution of securing this data communication by SSL layer was designed.
5

Simple SSH Management

Collett, Torstein Calvin 14 June 2021 (has links)
SSH certificates are used by administrators so connections to the server can be verified. This ensures that only authorized administrators can access the server and that the server being accessed is the intended machine. Current solutions for managing SSH certificates are focused on commercial use, which makes them cumbersome for small groups and individuals to use. These solutions require running multiple services that companies already use but add significant overhead for smaller groups. We developed a new standalone system that makes it easy to manage SSH certificates for small amounts of servers and users, without requiring additional servers to be deployed. We evaluated our system with a user study to demonstrate its ease of use. We hope that this implementation can help guide future research toward a more simplified certificate authentication system for SSH.
6

Sea Surface Height Variability and Eddy Statistical Properties in the Red Sea

Zhan, Peng 05 1900 (has links)
Satellite sea surface height (SSH) data over 1992-2012 are analyzed to study the spatial and temporal variability of sea level in the Red Sea. Empirical orthogonal functions (EOF) analysis suggests the remarkable seasonality of SSH in the Red Sea, and a significant correlation is found between SSH variation and seasonal wind cycle. A winding-angle based eddy identification algorithm is employed to derive the mesoscale eddy information from SSH data. Totally more than 5500 eddies are detected, belonging to 2583 eddy tracks. Statistics suggest that eddies generate over the entire Red Sea, with two regions in the central basin of high eddy frequency. 76% of the detected eddies have a radius ranging from 40km to 100km, of which both intensity and absolute vorticity decrease with eddy radius. The average eddy lifespan is about 5 weeks, and eddies with longer lifespan tend to have larger radius but less intensity. Different deformation rate exists between anticyclonic eddies (AEs) and cyclonic eddies (CEs), those eddies with higher intensity appear to be less deformed and more circular. Inspection of the 84 long-lived eddies suggests the AEs tend to move a little more northward than CEs. AE generation during summer is obviously lower than that during other seasons, while CE generation is higher during spring and summer. Other features of AEs and CEs are similar with both vorticity and intensity reaching the summer peaks in August and winter peaks in January. Inter-annual variability reveals that the eddies in the Red Sea are isolated from the global event. The eddy property tendencies are different from the south and north basin, both of which exhibit a two-year cycle. Showing a correlation coefficient of -0.91, Brunt–Väisälä frequency is negatively correlated with eddy kinetic energy (EKE), which results from AE activities in the high eddy frequency region. Climatological vertical velocity shear variation is identical with EKE except in the autumn, suggesting the vertical shear could convert the energy from baroclinic instability into eddy activity. Finally, numerical simulation results from the MIT general circulation model (MITgcm) are validated with previous studies and observations. The vertical structure of the simulated flux through Bab el Mandeb is successfully reproduced. Further validation with the 2010 cruise suggests that the thermocline occurs at ~200m, but the model vertical salinity gradient is lower than the observations. The model surface eddy variability is also examined, suggesting good agreement with satellite observations.
7

Estudo do cupim Coptotermes gestroi = análise de genes diferencialmente expressos entre castas e busca de genes de importância biotecnológica / Study of the termite Coptotermes gestroi : analysis of differentialy expressed genes between castes and search for genes with biotechnological applicability

Leonardo, Flávia Costa 17 August 2018 (has links)
Orientadores: Gonçalo Amarante Guimarães Pereira, Fernando Ferreira Costa / Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Biologia / Made available in DSpace on 2018-08-17T10:30:44Z (GMT). No. of bitstreams: 1 Leonardo_FlaviaCosta_D.pdf: 6145744 bytes, checksum: 199799932d8959740a6ec52e8963bcb8 (MD5) Previous issue date: 2010 / Resumo: Os cupins são insetos pertencentes à Ordem Isoptera, com mais de 3.000 espécies descritas. São importantes agentes de degradação de madeira e compostos celulósicos em geral. Entretanto, essas mesmas características tornam algumas das espécies danosas por destruírem estruturas de edificações, sendo responsáveis por prejuízos da ordem de milhões de dólares. Uma destas espécies-praga é o Coptotermes gestroi. Originária do sudeste asiático foi introduzida no Brasil no início do século XX, estabelecendo-se ao longo daregião costeira, mas com uma clara expansão para o interior do país. O ciclo de vida de C .gestroi inicia com a eclosão do ovo, a larva originada pode se transformar tanto em um operário (linhagem áptera) como em uma ninfa (linhagem ninfal), a qual pode originar um rei ou uma rainha. Além disso, o operário pode se transformar em soldado, sob indução do hormônio juvenil. Assim sendo, o objetivo do presente trabalho foi a avaliação da expressão gênica nas diversas castas e estágios de vida de C.gestroi visando a identificação de genes relacionados ao ciclo de vida e com possível aplicação biotecnológica. Para isso,foi deita a análise de uma biblioteca de cDNA de cabeça de operários previamente construída. Para melhor compreender genes diferencialmente expressos entre as castas,outras quatro bibliotecas subtrativas foram confeccionadas. Alguns dos genes identificados foram genes selecionados para a validação pelo método de PCR em tempo Real. O seqüenciamento de segunda geração (454) foi realizado com amostras de soldados e operários e mais de 110.000 transcritos foram identificados. Dentre eles destacam-se as Hexamerinas I e II, a epóxido hidroláse do hormônio juvenil e genes relacionados à musculatura. Quanto aos genes com potencial biotecnológico dezenove enzimas envolvidasna quebram da lignocelulose foram identificadas e serão investigadas para confirmar o papel destas neste processo. / Abstract: Termites are insects belonging to the Order Isoptera, with more than 3,000 describedspecies. These insects are important wood and cellulosic compounds degraders. However, these same characteristics make some of them harmful species to mankind, by destroying buildings, accounting for million dollars losses. One of these pest species is Coptotermesgestroi. Originated from Southeast Asia, it was introduced in Brazil in the early twentieth century, establishing colonies along the coastal region, but with a clear expansion into thecountry. The life cycle of C. gestroi works as follows: after hatching from the egg, thelarvae can become either a worker (apterous lineage) or a nymph (nymphal lineage), whichcan lead to a king or a queen. In addition, the worker can become a soldier, under inductionof juvenile hormone. Therefore, the purpose of this study was the evaluation of gene expression in different castes and developmental stages of C.gestroi in order to identifygenes related to different life cycles and biotechnological potential. To accomplish this, weanalized a workers head cDNA library previously prepared. To better understand genes differentially expressed between castes, other four subtractive libraries were constructed. Some of the genes identified were selected for validation by Real Time PCR. Secondgeneration sequencing (454) was performed with samples of workers and soldiers and morethan 110,000 transcripts were identified. Among them stand out Hexamerins I and II, thejuvenile hormone epoxide hydrolase and genes related to muscle formation. As for geneswith biotechnological potential, nineteen enzymes involved in lignocellulose's break downwere identified and will be investigated to confirm their role in this process. / Doutorado / Genetica Animal e Evolução / Doutor em Genetica e Biologia Molecular
8

Remote Netlab

Engkvist, Tobias January 2016 (has links)
Detta projekt har haft som fokus att skapa ett system där användare med hjälp av SSH ska kunna logga in på en server och utföra konfigurationer på switchar och routrar med olika krav såsom att enbart en användare får vara inloggad i systemet åt gången. För att uppnå målen och kraven så användes ett par olika skript med språk såsom shell, bash, perl och expect. Resultatet visar en färdig produkt och att detta projekt var genomförbart. Lösningsförslaget finns presenterat i form av ett flödesschema och sedan vanlig text. Slutligen presenteras och diskuteras även andra alternativa lösningar. / The projects main focus have been to create a system mainly for the users that study network technology on a more advanced level. In order for the students to start to configure the switches and routers they need to access a server with the SSH protocol which was one of the requirements. Another requirement was that only one user should be able to configure at same time (so two users should NOT be able to configure the switches and routers at the same time). The scripting languages that was used was bash, shell, perl and expect in order to achieve these goals and requirement. The result shows a finished product and that this project was feasable. The solution is presented as a flowchart as an overview and some regular text that explains the scripts in more depth. There are of course a ton of other ways to solve this problem and a few of them are presented and discussed in the later chapters.
9

Characterisation of genes derived from murine malignant mesothelioma by suppression subtractive hybridization

Thean, Ai Lee January 2002 (has links)
Malignant mesothelioma (MM) is an aggressive tumour, which is highly associated with previous asbestos exposure and is resistant to most conventional anticancer therapies. Previous studies have used a mouse model of to 01 p effective approaches to induction of anti-tumour immunity using modification of tumour cells by the introduction of genetic constructs expressing genes such as that for B7-1 so that tumour growth can be inhibited in vivo. Transfectant clones, AC29 B7-7 and AC29 B7-6, which showed equal levels of expression of B7-1 but were markedly different in tumorigenicity were assessed using suppression subtractive hybridization (SSH) in order to isolate transcripts which may have been differentially expressed in the two clones. SSH allowed isolation of a number of cDNAs which were apparently differentially expressed in the cell lines. These required characterisation in order to determine their possible relevance to tumorigenicity. Two cDNAs designated as 7-7-76 and 7-7-43 had been isolated previously and the aim of this project was to characterise these cDNAs by sequencing, searching for their homology relationships and investigating gene expression profiles. Preliminary searches revealed that clone 7-7-43 had homology to cyclin-dependent kinase regulatory subunit 1 which plays a role in the cell cycle. On the other hand, clone 77-76 showed only homology to an EST of hypertension related protein and therefore, further investigation was required to obtain the identity of clone 7-7-76. The first part of this project was to in investigate and evaluate gene expression on clone 7-7-43, using both relative RT-PCR and Northern blotting.' In the second part of this project, a more intense study of clone 7-7-76 was conducted. Clone 7-7-76 was investigated for its homology relationships and its gene expression profile. / Results obtained from relative RT-PCR suggested no difference in the expression of the either eDNA clone (7-7-43 and 7-7-76) between the MM clones AC29 B7-6 and AC29 B7-7, the cells used to derive these clones by SSH. Therefore, it was concluded that neither clone 7-7-43 nor 7-7-76 was differentially expressed in MM cells of differing immuno enicit RACE was employed in order to derive a longer sequence of clone 7-7-76 and the newly derived sequence of 7-7-76 was again used to search for homologies using a wider range of sequences for human and other species. These investigations on clone 7-7-76 showed it to correspond to the sequence of human mitofusin 2 which is involved in determining mitochondrial morphology The results determined in this project suggest that clones 7-7-43 and 7-7-76 are not differentially expressed in the range of MM cell lines tested. The data have however highlighted the potential of the SSH technique to easily derive cDNA clones worthy of investigation, but underline the possibility of false positive clones being isolated. The need for an efficient, accurate screening procedure such as real-time PCR is acknowledged.
10

Netconf Device Simulator : Developing a NETCONF based testing platform

Ennefors, William January 2018 (has links)
When developing network configuration/orchestration applications, it is often convenient to run automated as well as manual tests towards simulated rather than actual hardware devices. Though there exists software of this type, they rarely contain features that can be convenient for testing purposes. The simulation needs to be lightweight, be able to generate special events, and use the NETCONF RPC protocol. This thesis will explain the decisions that were made while developing a simulation software of this type, it will also explain the underlying functionalities and terms associated with the simulation.

Page generated in 0.0276 seconds